Turning Network Free-Riders' Lives Upside Down 658
An anonymous reader writes "You discover that your neighbours are using your unsecured wireless network without your permission. Do you secure it? Or do you do something more fun? A few minutes with squid and iptables could greatly improve your neighbours' Web experience ..." Improve is a relative term, but this is certainly gentler than certain other approaches.
Understanding the Approach to this (Score:5, Informative)
The author obviously has a Linux server in his house, that is running DHCPD [freeshell.org]
To selectively send some clients to some locations, and others to the normal internet, he assigns an IP address on a different network to clients that don't have MAC Addresses [wikipedia.org] that he knows about.
Forwarding on to sites of his choice is done by using IPTables [netfilter.org], which is a utility that allows you to configure the packet filtering components of the Linux TCP/IP Stack. In this instance, the Linux box is just functioning as a firewall, and he is selectively sending requests from certain IP addresses to different hosts of his chosing.
Finally, the Up-side-down and blurry-image conversions is accomplished by sending page requests from those before-mentioned IP addresses to a proxy server, which in this case is Squid [squid-cache.org] - and then allowing the proxy server to run a script which calls an ImageMagick [imagemagick.org] command called mogrify [imagemagick.org] which allows you to resize an image, blur, crop, despeckle, dither, draw on, flip, join, re-sample, and much more.
And that folks, is the rest of the story.
Re:It's not their fault... (Score:3, Informative)
This is what SSH tunnels are for (Score:4, Informative)
Re:Goats (Score:5, Informative)
Re:Liability? (Score:3, Informative)
Re:Goats (Score:0, Informative)
Re:It could be worse... (Score:2, Informative)
Re:Goats (Score:2, Informative)
Essentially what TFA is doing. If your point is to keep people off your bandwidth, this will do it. It wont, however keep them from sniffing your traffic and invading your LAN.
It is still a great piece of software, I currently work for a company whos product is exactly this, commecially (for hotels etc.)
www.solutioninc.com
Re:Goats (Score:4, Informative)
A really easy method is to allow access only to specific MAC addresses. I hate encryption since it's such a pain and I don't do anything secure wirelessly anyways. Now all I have to do is set the MAC address on the router and I'm in!
Comment removed (Score:4, Informative)
You ARE Sneaky! (Score:1, Informative)
Re:Missing the point, I think - absurd. (Score:1, Informative)
#1. The design of wireless technology broadcasts available services to the listening world.
While I despise real-world analogies, let me try my hand at one: You put a sign up at the end of your driveway, advertising free water from the hose. The hose is run from the house, down the driveway, left running constantly. If someone wants to come drink from it, they can.
This analogy fits better than the 'unlocked door' one, because wireless routers broadcast SSIDs and if they use encryption.
#2. The use of someone's wireless does not prevent them from using it themself.
You get in someone's car and drive it off, you have stolen their car. If you drink from someone's water hose (that has a sign over it saying 'free water'), are you (to quote Adam West on Family Guy) 'stealing their water'?
#3. You don't 'own' the radio waves that pass through your property. To compare radio waves and internet service to stolen cars, wallets, houses, etc is just intellectually dishonest.
Now, is it moral to use someone's unsecured wireless network? Probably. Does the implied technological permission to use that wireless network (translation: broadcast SSID, DHCP leases for whoever asks, etc) translate into real-world legal permission? I don't know. But the way the technology works should impact this debate.
Please, people, stop using these inane physical analogies. It does not compare to the 'visibility' of your garden. You are broadcasting radio waves, advertising a service for public consumption. If you had a sign on your garden saying "Public Garden" then, yes, the analogy fits. Stop comparing this to private property. Your radio broadcasts, leaving your private property, are not protected as if they were physical items you own. Do not pretend this is the case. This is about more than private property, this is about advertised services.
Re:Sniff, sniff. (Score:1, Informative)
*Where I'm the IT guy and using it for purely ethical things...
Re:Obligatory Bash.org (Score:3, Informative)
Re:Goats (Score:3, Informative)
Re:Goats (Score:4, Informative)
Re:Goats (Score:4, Informative)
Re:Goats (Score:1, Informative)
Where do people come up with this garbage? I have worked in Computer Forensics for years, been a witness in court, etc. If the IP is static, you're screwed. If it is dynamically assigned, then the ISP is provided a court order to identify the account which was using the provided IP(s) at the time and the account holder. I've seen this tons of times. Usually the first court order is to identify the user and keep a record of all traffic which passes through their account. You end up with a huge amount of evidence of criminal activity interspersed with lots and lots of personally identifying data and data which matches the profile of the individual. They are rightfully screwed and it all started with a crime that led back to an IP address.
Really, where do the armchair experts here at slashdot come up with this tripe?