Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Legality of operating a "public" wifi network

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    15 Posts 4 Posters 6.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • cmcdonaldC
      cmcdonald Netgate Developer
      last edited by

      @Clear-Pixel:

      I would say Keeping traffic logs would keep you from being prosecuted. How far back your traffic logs should go is the question. I'm not so sure I would go by someones suggestion for this topic in a forum unless they can point you to local, state and federal laws governing open wifi networks for your area.

      Would be best to consult a local company which specialized in open wifi networks or a attorney.

      Michigan, United States

      Also, what kind of logs are we talking about? Raw Firewall Logs?

      Need help fast? https://www.netgate.com/support

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        My IP isn't me.

        I hope that anyone who clings to the philosophy that IP = Person gets hacked and has their network used for nefarious purposes.

        (Not that I in any way would condone such an act, but it would be an ironic lesson)

        1 Reply Last reply Reply Quote 0
        • C
          Clear-Pixel
          last edited by

          @vbman213

          I don't have enough experience to give you guides lines on logs ….. maybe someone else here in the forum can help you.

          I haven't had to play with Captive portal yet, but It may provide all the log details needed to pinpoint a perpetrator.

          From what I have read and understood, you will need a separate server just to store all log data.

          HP EliteBook 2530p Laptop - Core2 Duo SL9600 @ 2.13Ghz - 4 GB Ram -128GB SSD
          Atheros Mini PCI-E as Access Point (AR5BXB63H/AR5007EG/AR2425)
          Single Ethernet Port - VLAN
          Cisco SG300 10-port Gigabit Managed Switch
          Cisco DPC3008 Cable Modem  30/4 Mbps
          Pfsense 2.1-RELEASE (amd64)
          –------------------------------------------------------------
          Total Network Power Consumption - 29 Watts

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            My take on this is:

            1- If you don't have logs they can't demand logs.  Also, just because someone wants a log doesn't mean they have a good reason to get a log but if you have that log they will probably get it anyway - deserved or not.  Better not to have.

            2 - Unless I woke up in another country today, I don't have to prove innocence, they have to prove guilt.  With 200 users and no logs, its not provable.

            1 Reply Last reply Reply Quote 0
            • C
              Clear-Pixel
              last edited by

              @kejianshi:

              My IP isn't me.

              I hope that anyone who clings to the philosophy that IP = Person gets hacked and has their network used for nefarious purposes.

              (Not that I in any way would condone such an act, but it would be an ironic lesson)

              The way the law work now days is you are Guilty until proven Innocent …... Try defending yourself in Court without logs ....... When you setup a account with a ISP you are bound by there terms and conditions. Read your terms and conditions and report back ...... You will be rather surprised what liabilities fall on your shoulders as being THE Account Holder!

              HP EliteBook 2530p Laptop - Core2 Duo SL9600 @ 2.13Ghz - 4 GB Ram -128GB SSD
              Atheros Mini PCI-E as Access Point (AR5BXB63H/AR5007EG/AR2425)
              Single Ethernet Port - VLAN
              Cisco SG300 10-port Gigabit Managed Switch
              Cisco DPC3008 Cable Modem  30/4 Mbps
              Pfsense 2.1-RELEASE (amd64)
              –------------------------------------------------------------
              Total Network Power Consumption - 29 Watts

              1 Reply Last reply Reply Quote 0
              • K
                kejianshi
                last edited by

                I actually worked with an attorney for a while.  Once we had such a case.  When I started talking the POSSIBILITY of open proxies, the concept of proving fingers on a keyboard etc and open wifi, they dropped the case on the condition I not show up to talk about any of that in respect to the others on their list.  I'm not saying a person can't be railroaded, but we are not police and I don't think we should all be in the police business. If it were a case of just you at your home in the middle of nowhere, its still easily defensible but an apartment building?  Seriously?  If someone gets a warrant, they can come to the building in person and "tap" the router the way it should be.

                Actually, on second though, get 4TB of hard drive and log everything.
                Since there is now no big difference between here and China, I may as well go where the beer tastes better and nothing is ever closed.

                1 Reply Last reply Reply Quote 0
                • cmcdonaldC
                  cmcdonald Netgate Developer
                  last edited by

                  @kejianshi:

                  I actually worked with an attorney for a while.  Once we had such a case.  When I started talking the POSSIBILITY of open proxies, the concept of proving fingers on a keyboard etc and open wifi, they dropped the case on the condition I not show up to talk about any of that in respect to the others on their list.  I'm not saying a person can't be railroaded, but we are not police and I don't think we should all be in the police business. If it were a case of just you at your home in the middle of nowhere, its still easily defensible but an apartment building?  Seriously?  If someone gets a warrant, they can come to the building in person and "tap" the router the way it should be.

                  Actually, on second though, get 4TB of hard drive and log everything.
                  Since there is now no big difference between here and China, I may as well go where the beer tastes better and nothing is ever closed.

                  Since my local routers only have 32GB storage (SSD) and I minimize writes to disk by disabling the local syslogd and sending everything to a remote syslog server. I just enabled the log switch on my pass rules for the tenant network and I'm NOW collecting every "PASSED" packet that goes across the tenant network. I'm also logging portal auth and dhcpd. That should be enough to put together all of the puzzle pieces if I needed to.

                  Need help fast? https://www.netgate.com/support

                  1 Reply Last reply Reply Quote 0
                  • C
                    Clear-Pixel
                    last edited by

                    I understand clearly and agree with your comments to a certain degree kejianshi, but it can depend on what Corporation or Government entity that is coming after you.

                    If its something serious or it could simply be to extort you financially. You can bet these crooked attorney will do it to make sure they can continue driving that Porsche 911.

                    Prosecutors don't care if its a innocent victim, attorneys just want your money.

                    The World of Law is Corrupt to the Core!

                    I would rather be on the safe side and have LOGS to make sure that I cant get steam rolled …. :)

                    If trouble arises I also think you should not make NO entity aware that you have logs ...... reason I say this is to test the ones making the accusations. This would help clue you in on who, what and if they are hostile.

                    HP EliteBook 2530p Laptop - Core2 Duo SL9600 @ 2.13Ghz - 4 GB Ram -128GB SSD
                    Atheros Mini PCI-E as Access Point (AR5BXB63H/AR5007EG/AR2425)
                    Single Ethernet Port - VLAN
                    Cisco SG300 10-port Gigabit Managed Switch
                    Cisco DPC3008 Cable Modem  30/4 Mbps
                    Pfsense 2.1-RELEASE (amd64)
                    –------------------------------------------------------------
                    Total Network Power Consumption - 29 Watts

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      I also have a network for a tenant but my logs are off except squid cache (which could be used somewhat as a log) but thats just for improved performance.  Same way my IP camera is positioned to see my space and the kids space and to tilt and pan within that space but not my tenant’s space.

                      But I am considering lo-jacking the neighbour’s wife just for kicks.  I might have a sudden need to prove her whereabouts just in case the husband asks me if we were together on X night.

                      1 Reply Last reply Reply Quote 0
                      • D
                        dhatz
                        last edited by

                        @vbman213:

                        @Clear-Pixel:

                        I would say Keeping traffic logs would keep you from being prosecuted. How far back your traffic logs should go is the question. I'm not so sure I would go by someones suggestion for this topic in a forum unless they can point you to local, state and federal laws governing open wifi networks for your area.

                        Would be best to consult a local company which specialized in open wifi networks or a attorney.

                        Michigan, United States

                        Also, what kind of logs are we talking about? Raw Firewall Logs?

                        Google "CALEA"

                        Check http://wiki.mikrotik.com/wiki/CALEA

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          I'm no fan of CALEA, but as I understand it, even CALEA has threshholds for required emplementation.  Specifically number of users and type of service.  I think this guy is too far below the radar to get forced into CALEA requirements, however that depends on how many people is "large wifi network for a nine building apartment complex".  Technically speaking.

                          https://freedom-to-tinker.com/blog/felten/calea-ii-risks-of-wiretap-modifications-to-endpoints/

                          Another problem I have with logging, especially copious logging is that if a logging system is compromised, now the privacy of everyone included in the logs has been compromised.

                          CALEA compliant systems have been "hijacked" by criminals to invade the privacy of people and even to commit financial crimes.

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.