SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Finesse of
Conscious
Containment:
Staying on Top of Security and
Spectrum Rules in
WIPS Deployments
#WLPC
Hemant Chaskar @CHemantC
Marriott agreed to pay a $600,000 fine
after the Federal Communications
Commission found the company blocked
consumer Wi-Fi networks last year
during an event at a hotel and conference
center in Nashville.
http://transition.fcc.gov/Daily_Releases/Dai
ly_Business/2014/db1003/DA-14-
1444A1.pdf
RF Shock
@CHemantC
Marriott has agreed to pay a $600,000 fine
after the Federal Communications
Commission found the company blocked
consumer Wi-Fi networks last year during
an event at a hotel and conference center
in Nashville.
Marriott fined $600,000 by FCC
for blocking guests' Wi-Fi
VS
http://apps.fcc.gov/ecfs/document/view?id=
60000986872
AHLA Petitions the FCC
@CHemantC
“Wi-Fi Operators Should Have The Ability to Manage Their
Networks In Order To Offer Secure And Reliable Wi-Fi
Service”
“Wi-Fi networks are more susceptible to a variety of attacks
that can threaten the security and reliability of a hotel's
network or pose a risk to guests, including: (i) signal
interception; (ii) unauthorized network access; (iii)
unauthorized access points; and (iv) access point spoofing.”
FCC Warning on Wi-Fi Blocking
“No hotel, convention center, or other
commercial establishment or the network
operator providing services at such
establishments may intentionally block or
disrupt personal Wi-Fi hot spots”
Predicament:
Caveats and Partial Coverage of Use
Cases = Confusion.
@CHemantC
For the Rest of the Presentation …
 Wear your engineering hat
 Stay focused on security (WIPS)
 Recognize concreate versus haze
 Disclaimer: I am NOT a regulatory authority.
 My arguments are based on technology knowledge
and civic sense.
@CHemantC
http://www.fcc.gov/document/warning-wi-fi-
blocking-prohibited
Any Wi-Fi device that is not mine is security threat,
must be crushed (contained)!
“Marriott International, Inc. deployed a Wi-Fi
deauthentication protocol to deliberately block
consumers who sought to connect to the Internet using
their own personal Wi-Fi hot spots. Marriott admitted
that the customers it blocked did not pose a security
threat.”
“No hotel, convention center, or other commercial
establishment or the network operator providing services
at such establishments may intentionally block or disrupt
personal Wi-Fi hot spots on such premises providing
services at such establishments may intentionally block or
disrupt personal Wi-Fi hot spots on such premises,
including as part of an effort to force consumers to
purchase access to the property owner’s Wi-Fi
network.”
“In addition, we reiterate that Federal law prohibits the
operation, marketing, or sale of any type of jamming
equipment, including devices that interfere with Wi-Fi,
cellular, or public safety communications.”
Brute Force =/= Security
Any Wi-Fi device
in the airspace
that is not mine
is a security
threat and must
be crushed
(contained)!
#WLPC@CHemantC
Finesse of Conscious Containment
Is there a way to use containment for
Wi-Fi security (WIPS), without:
 Harming legit users sharing the airwaves
 Causing airtime wastage
 Human intervention
@CHemantC
Fin. Con. Con. Rules
1) Only contain devices that you
control
2) Confirm violation before
containment
3) Do containment surgically
@CHemantC
Client Containment
Definition:
 Blocking specific client from connecting to AP
Clients that you control:
 Enterprise assigned clients
 For on-boarded clients (BYOD, Guest), take
opt-in permission if you plan to contain them
@CHemantC
Client Containment
Confirmed violation:
 Block controlled client’s association to
Honeypot/Hotspot/Ad hoc network when it
happens
Surgical deauth:
 Don’t disrupt other clients connecting to
Honeypot/Hotspot/Ad hoc network
 Well timed, feedback based deauth for minimal
airtime consumption
@CHemantC
Containment Airtime Consumption
@CHemantC
0.1
0.6
1.1
1.6
2.1
2.6
3.1
0 2 4 6 8 10 12
Percent(%)
Concurrent Associations Under Sustained Containment
Deauth + Connection Traffic
AP Containment
Definition:
 Blocking any client from connecting to AP
APs that you control:
 Managed enterprise APs
 Rogue APs: Unmanaged APs physically
connected to enterprise wired network
@CHemantC
Confirmed violation:
 Confirm rogue AP is physically connected to
your network (automatic or manual methods)
Surgical wireless containment:
 Do not disrupt neighborhood APs without
knowing if they are connected to your network
 Well timed, feedback based deauth for minimal
airtime consumption
AP Containment
@CHemantC
Wire-side containment is also an option
 Can bypass the FCC issue altogether
 Techniques: ARP tarpitting, switch port
blocking
AP Containment
@CHemantC
Closing Remarks
FCC vs Marriott spat opened a can of worms.
Regulatory guidance is missing for many use
cases.
Brute vs Fin. Con. Con. as technical matter.
Hope FCC will be clarify its stand on Fin. Con.
Con. and other use cases in future.
@CHemantC
Additional Information
FCC order and decree in the matter of Marriott International
Understanding FCC decision regarding Wi-Fi containment at Marriott by
Hemant Chaskar via @AirTight blog
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi via SlideShare
FCC-Marriott WiFi Blocking Fine Opens Pandora’s Box by Lee Badman via
InformationWeek Network Computing
Wire-Side Containment – Hidden Gem of Rogue Access Point Protection
by Hemant Chaskar via @AirTight blog
AHLA Petition: Petition For Declaratory Ruling, Or In The Alternative, For
Rulemaking
FCC WARNING: Wi-Fi Blocking is Prohibited, January 27 2015
http://www.airtightnetworks.com/home/products/AirTight-WIPS.html
Thank you!
#WLPC

Weitere ähnliche Inhalte

Ähnlich wie WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by Hemant Chaskar

FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
Dean Kay
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
thasnim1304
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docxC10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
clairbycraft
 
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docxC10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
jasoninnes20
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
jackiewalcutt
 
Case Study 3 Choice Hotels International By CIS505 C.docx
Case Study 3 Choice Hotels International By CIS505 C.docxCase Study 3 Choice Hotels International By CIS505 C.docx
Case Study 3 Choice Hotels International By CIS505 C.docx
moggdede
 
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Roger Filomeno
 

Ähnlich wie WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by Hemant Chaskar (20)

FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hotspot(wi-fi)
hotspot(wi-fi)hotspot(wi-fi)
hotspot(wi-fi)
 
Santa Clara Law Presentation
Santa Clara Law PresentationSanta Clara Law Presentation
Santa Clara Law Presentation
 
Hold The Phone: Assessing the Rights of Wireless Handset Owners and the Netwo...
Hold The Phone: Assessing the Rights of Wireless Handset Owners and the Netwo...Hold The Phone: Assessing the Rights of Wireless Handset Owners and the Netwo...
Hold The Phone: Assessing the Rights of Wireless Handset Owners and the Netwo...
 
Security Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity PlanSecurity Assessment Report and Business Continuity Plan
Security Assessment Report and Business Continuity Plan
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
Public wifi
Public wifiPublic wifi
Public wifi
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docxC10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
 
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docxC10-1 CASE STUDY 10     CHOICE HOTELS INTERNATIONAL .docx
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docx
 
1. Part 1) Choose your own topic related to web technologiesappl.docx
1. Part 1)  Choose your own topic related to web technologiesappl.docx1. Part 1)  Choose your own topic related to web technologiesappl.docx
1. Part 1) Choose your own topic related to web technologiesappl.docx
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
Case Study 3 Choice Hotels International By CIS505 C.docx
Case Study 3 Choice Hotels International By CIS505 C.docxCase Study 3 Choice Hotels International By CIS505 C.docx
Case Study 3 Choice Hotels International By CIS505 C.docx
 
DS_Kloudyy_v2015
DS_Kloudyy_v2015DS_Kloudyy_v2015
DS_Kloudyy_v2015
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
 

Mehr von AirTight Networks

The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
AirTight Networks
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
AirTight Networks
 

Mehr von AirTight Networks (8)

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
 
Appi fi
Appi fiAppi fi
Appi fi
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
Cafe Latte
Cafe LatteCafe Latte
Cafe Latte
 

Kürzlich hochgeladen

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Kürzlich hochgeladen (20)

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 

WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by Hemant Chaskar

  • 1. Finesse of Conscious Containment: Staying on Top of Security and Spectrum Rules in WIPS Deployments #WLPC Hemant Chaskar @CHemantC
  • 2. Marriott agreed to pay a $600,000 fine after the Federal Communications Commission found the company blocked consumer Wi-Fi networks last year during an event at a hotel and conference center in Nashville. http://transition.fcc.gov/Daily_Releases/Dai ly_Business/2014/db1003/DA-14- 1444A1.pdf RF Shock @CHemantC Marriott has agreed to pay a $600,000 fine after the Federal Communications Commission found the company blocked consumer Wi-Fi networks last year during an event at a hotel and conference center in Nashville. Marriott fined $600,000 by FCC for blocking guests' Wi-Fi VS
  • 3. http://apps.fcc.gov/ecfs/document/view?id= 60000986872 AHLA Petitions the FCC @CHemantC “Wi-Fi Operators Should Have The Ability to Manage Their Networks In Order To Offer Secure And Reliable Wi-Fi Service” “Wi-Fi networks are more susceptible to a variety of attacks that can threaten the security and reliability of a hotel's network or pose a risk to guests, including: (i) signal interception; (ii) unauthorized network access; (iii) unauthorized access points; and (iv) access point spoofing.”
  • 4. FCC Warning on Wi-Fi Blocking “No hotel, convention center, or other commercial establishment or the network operator providing services at such establishments may intentionally block or disrupt personal Wi-Fi hot spots” Predicament: Caveats and Partial Coverage of Use Cases = Confusion. @CHemantC
  • 5. For the Rest of the Presentation …  Wear your engineering hat  Stay focused on security (WIPS)  Recognize concreate versus haze  Disclaimer: I am NOT a regulatory authority.  My arguments are based on technology knowledge and civic sense. @CHemantC
  • 6. http://www.fcc.gov/document/warning-wi-fi- blocking-prohibited Any Wi-Fi device that is not mine is security threat, must be crushed (contained)! “Marriott International, Inc. deployed a Wi-Fi deauthentication protocol to deliberately block consumers who sought to connect to the Internet using their own personal Wi-Fi hot spots. Marriott admitted that the customers it blocked did not pose a security threat.” “No hotel, convention center, or other commercial establishment or the network operator providing services at such establishments may intentionally block or disrupt personal Wi-Fi hot spots on such premises providing services at such establishments may intentionally block or disrupt personal Wi-Fi hot spots on such premises, including as part of an effort to force consumers to purchase access to the property owner’s Wi-Fi network.” “In addition, we reiterate that Federal law prohibits the operation, marketing, or sale of any type of jamming equipment, including devices that interfere with Wi-Fi, cellular, or public safety communications.” Brute Force =/= Security Any Wi-Fi device in the airspace that is not mine is a security threat and must be crushed (contained)! #WLPC@CHemantC
  • 7. Finesse of Conscious Containment Is there a way to use containment for Wi-Fi security (WIPS), without:  Harming legit users sharing the airwaves  Causing airtime wastage  Human intervention @CHemantC
  • 8. Fin. Con. Con. Rules 1) Only contain devices that you control 2) Confirm violation before containment 3) Do containment surgically @CHemantC
  • 9. Client Containment Definition:  Blocking specific client from connecting to AP Clients that you control:  Enterprise assigned clients  For on-boarded clients (BYOD, Guest), take opt-in permission if you plan to contain them @CHemantC
  • 10. Client Containment Confirmed violation:  Block controlled client’s association to Honeypot/Hotspot/Ad hoc network when it happens Surgical deauth:  Don’t disrupt other clients connecting to Honeypot/Hotspot/Ad hoc network  Well timed, feedback based deauth for minimal airtime consumption @CHemantC
  • 11. Containment Airtime Consumption @CHemantC 0.1 0.6 1.1 1.6 2.1 2.6 3.1 0 2 4 6 8 10 12 Percent(%) Concurrent Associations Under Sustained Containment Deauth + Connection Traffic
  • 12. AP Containment Definition:  Blocking any client from connecting to AP APs that you control:  Managed enterprise APs  Rogue APs: Unmanaged APs physically connected to enterprise wired network @CHemantC
  • 13. Confirmed violation:  Confirm rogue AP is physically connected to your network (automatic or manual methods) Surgical wireless containment:  Do not disrupt neighborhood APs without knowing if they are connected to your network  Well timed, feedback based deauth for minimal airtime consumption AP Containment @CHemantC
  • 14. Wire-side containment is also an option  Can bypass the FCC issue altogether  Techniques: ARP tarpitting, switch port blocking AP Containment @CHemantC
  • 15. Closing Remarks FCC vs Marriott spat opened a can of worms. Regulatory guidance is missing for many use cases. Brute vs Fin. Con. Con. as technical matter. Hope FCC will be clarify its stand on Fin. Con. Con. and other use cases in future. @CHemantC
  • 16. Additional Information FCC order and decree in the matter of Marriott International Understanding FCC decision regarding Wi-Fi containment at Marriott by Hemant Chaskar via @AirTight blog Marriott Fined 600K by FCC for Blocking Guests Wi-Fi via SlideShare FCC-Marriott WiFi Blocking Fine Opens Pandora’s Box by Lee Badman via InformationWeek Network Computing Wire-Side Containment – Hidden Gem of Rogue Access Point Protection by Hemant Chaskar via @AirTight blog AHLA Petition: Petition For Declaratory Ruling, Or In The Alternative, For Rulemaking FCC WARNING: Wi-Fi Blocking is Prohibited, January 27 2015 http://www.airtightnetworks.com/home/products/AirTight-WIPS.html