Wednesday, June 16, 2010
Wi-Fi uses both single-carrier direct-sequence spread spectrum radio technology (part of the larger family of spread spectrum systems) and multi-carrier orthogonal frequency-division multiplexing (OFDM) radio technology. The deregulation of certain radio-frequencies[by whom?] for unlicensed spread spectrum deployment enabled the development of Wi-Fi products, Wi-Fi's onetime competitor HomeRF, Bluetooth, and many other products such as some types of cordless telephones.
In the US, the FCC first made unlicensed spread spectrum available in rules adopted on May 9, 1985.
Many other countries later adapted these FCC regulations, enabling use of this technology in all major countries. The FCC action was proposed by Michael Marcus of the FCC staff in 1980 and the subsequent regulatory action took 5 more years. It was part of a broader proposal to allow civil use of spread spectrum technology and was opposed at the time by mainstream equipment manufacturers and many radio system operators.
Wi-Fi technology has its origins in a 1985 ruling by the U.S. Federal Communications Commission that released several bands of the radio spectrum for unlicensed use. In 1991 NCR Corporation/AT&T (later Lucent Technologies and Agere Systems) invented the precursor to 802.11 / Wi-Fi in Nieuwegein, The Netherlands. The inventors initially intended to use the technology for cashier systems; the first wireless products were brought on the market under the name WaveLAN with raw data rates of 1 Mbit/s and 2 Mbit/s. Vic Hayes, who held the chair of IEEE 802.11 for 10 years and has been called the "father of Wi-Fi" was involved in designing the initial 802.11b and 802.11a standards within the IEEE.
In 1992, the CSIRO obtained a patent in Australia for their wireless data transfer technology. In 1996, they obtained a patent for the same technology in the US.WiFi uses the mathematical formula in the patents. In 2000, CSIRO demonstrated the world's first wireless local area network internet connection.
In April 2009, 14 tech companies including Intel, Microsoft, HP, Dell, agreed to pay CSIRO $250 million for their Wi-Fi patent infringements.
Europe leads overall in uptake of wireless-phone technology, but the US leads in Wi-Fi systems partly because it leads in laptop computer usage. As of July 2005, there were at least 68,643 Wi-Fi locations worldwide, a majority in the US, followed by the UK and Germany. The US and Western Europe have about 80% of the worldwide Wi-Fi users. Plans are underway in metropolitan areas of the US to provide free public Wi-Fi coverage. Even with these large numbers and more expansion, the extent of actual Wi-Fi usage is lower than expected. Jupiter Research found that only 15% of people have used Wi-Fi and only 6% in a public place.
Wi-Fi (pronounced /ˈwaɪfaɪ/) is a trademark of the Wi-Fi Alliance that manufacturers may use to brand certified products that belong to a class of wireless local area network (WLAN) devices based on the IEEE 802.11 standards, which is by far the most widespread WLAN class today. Because of the close relationship with its underlying standard, the term Wi-Fi is often used as a synonym for IEEE 802.11 technology.
The Wi-Fi Alliance, a global association of companies, promotes WLAN technology and certifies products if they conform to certain standards of interoperability. Not every IEEE 802.11-compliant device is submitted for certification to the Wi-Fi Alliance, sometimes because of costs associated with the certification process. The lack of the Wi-Fi logo does not necessarily imply a device is incompatible with Wi-Fi devices.
As of 2010, IEEE 802.11 devices are installed in many personal computers, video game consoles, smartphones, printers, and other peripherals, and virtually all laptop or palm-sized computers.
Wednesday, June 9, 2010
Cutting off IP connectivity to spam sources
Router ACLs (under Linux or BPF)
Host Routing Tables
There are at least three ways to block IP connections from spam sites. The first two block connectivity at a fairly low level. You can also block spam sites from accessing your TCP/IP services such as SMTP, FTP and HTTP.
The first method involves dropping routes received via BGP, so is typically best suited to ISPs than to individual users. See MAPS for more information.
The second method is useful if you don't run BGP, for example if your site is an end node on the Internet. You probably already use router access lists to implement packet filtering for security purposes. Simply add the IP range of the spam sites to your packet filters, and no spam packets will reach your site.
On a Cisco router, the ACL is defined by:
access-list 100 deny ip ppp.qqq.rrr.0 0.0.0.255 any
where ppp.qqq.rrr.0 is the address used by the spamming site. If "ip" is replaced by "tcp" and "any" is prefix by "eq smtp", only SMTP will be block, as per "port blocking selected outgoing calls"
Note that with more complex ACLs that the ORDER IS SIGNIFICANT
The interface to filter also needs:
ip access-group 100 in
Linux boxes with IP filtering enabled can use a command such as
ipfwadm -I -a deny -S ppp.qqq.rrr.000/255.255.255.0
or (depending on the release version ?)
ipfwadm -I -a deny -S ppp.qqq.rrr.000/24 -D 0.0.0.0/0
"-I" means "incoming firewall rule".
"-a deny" means "add the policy to deny this".
"-S ppp.qqq.rrr.000/255.255.255.0" means the traffic has a source and netmask as specified.
"-D 0.0.0.0/0" means to any destination.
You can also use "-a reject" instead of "-a deny". When you use a "reject", the remote site gets "connection refuesd". When you use a "deny", the remote site just thinks the connection times out.
Conversely, ISPs can be good net citizens by port blocking selected outgoing calls.
Using the LBL BPF kernel filter
The LBL BFP kernel filter can be used to reject packets from SPAM sites with `port unreachable' with a filter such as
dst port 25 and (src net 205.199.212 or src net 204.250.46/27)
The author warns `Installing BPF kernel filters is not for everyone. But it's not too difficult to install the current version of bpf on a SunOS 4 kernel and I will soon include the necessary patches for FreeBSD.'
Update 14 June 2002: BPF is now a standard part of FreeBSD.
The third method makes use of the TCP wrappers package. (The latest version is available in ftp://ftp.porcupine.org/pub/security/index.html and is 7.6 as of this writing.) The TCP wrapper allows a site administrator to wrap services so that they can only be used by authorized hosts. By enabling "-DPROCESS_OPTIONS" when compiling tcpd, finer control can be achieved over which sites can call. A single /etc/hosts.allow can say which host can, and which cannot, call services. In this form, to block calls for `service' from badsite.com, have the line
service : badsite.com .badsite.com : DENY
If PROCESS_OPTIONS is not set, then nothing need be added to hosts.allow, but /etc/hosts.deny should have
service : badsite.com .badsite.com
Note that the ORDER in which the rules are given IS SIGNIFICANT. Take care to ensure that there isn't an ALL entry before the line which denies access.
See the section on mail blocking for an example of how to use the TCP Wrapper in conjunction with the TIS Firewall Toolkit to block spam sites from using your SMTP server.
Host Routing Tables
On a per host basis, it is possible to create dummy route entries which cause all reply packets for the relevant hosts or networks not to get to the sender, ensuring that TCP connections cannot be established. This may have an adverse effect on the listen queue, as most network code does not expect the initial handshakes to fail. As such, it may be necessary to increase the listen queue of the MTA, and/or raise the default system listen queue (e.g. for sendmail, use the undocumented "OOL=20" in sendmail.cf to double the queue length from the default setting of 10).
The exact format of the command to achieve this varies between systems, but it may be of the form:
route add -host 22.214.171.124 gw 127.0.0.1
route add -net 126.96.36.199 gw 127.0.0.1 netmask 255.255.255.0
Some systems (e.g. FreeBSD) have a "-reject" flag.
Ross Wheeler, from an Australian ISP, has written a script that dynamically blocks IP routing to addresses of hosts that have recently attempted any number of invalid probes, such as sending to nonexistent users, attempting to relay e-mail, or hitting "bait" addresses..
PacketBL is a tool that uses DNSBLs to configure network filtering to drop packets (Linux).
This is a chapter on using spamd on OpenBSD to redirect SMTP connections from spammer hosts to a specialized mail daemon that rejects their mail
In addition to all of the bad things spammers do to your mailbox and Usenet, they are also dishonest and unethical. Spammers have been documented as stealing other site's domain names via forgery - both Reply.Net and Concentric Networks have been hit this way. Indeed, Outernet, Inc. was actually attacked by one such spammer.
12 Sep 2001 - Spammers are soliciting donations for relatives of the victims of the 9/11/2001 terrorist attacks on the USA. We at spam.abuse.net do not believe that any of these relatives will see any of that money.
The spammers have a new trick - they supply an offshore phone number that you are supposed to call to be removed. The call costs $2 per minute. Sometimes they play a tape directing people to CAUCE, in what appears to be an attempt to discredit us. See an example.
One trick the spammers tried is to set up fake anti-spam sites, or to forge e-mail from anti-spam organizations such as CAUCE. Neither CAUCE, as an organization, nor any anti-spammers, as individuals, are soliciting or accepting donations of money or any other valuable consideration. Another earmark of just such a forgery is use of a throw-away or invalid e-mail address. If you see a supposed anti-spam e-mail or a web site that is asking for money, it's a fake. Report it to your nearest anti-spammer and the National Fraud Information Center.
Spammers lie to their customers. For example, Quantum Communications claimed to Mass Music, an innocent customer, that they'd send a mailing to people who'd asked to receive info about new products and services, not to thousands of unwilling spam recipients. Now Mass Music's made thousands of new enemies who will never buy from them after to being spammed, due to Quantum's misrepresentations.
Another, similar, lie is to sell someone a mailing list and tell them that the people on it want advertising e-mail. Most of the time, the list is one of the same old spam lists that's been around five years. There are a very few lists of people who've signed up for ads, but they're small, targetted, anot not cheap. Any large list purporting to be of people who want any kind of advertising e-mail is a fraud.
Spammers also cheat their suppliers. A number of ISPs have admitted that many or most of their spammers never pay for their service. This is especially true with the spammers who use free trial accounts with a provider to send their spew. It's obvious in those cases that they never intended to pay.
Further, as the "Global Communications" 809 phone fraud shows, con-men and thieves are gravitating toward massive spams as a way to perpetrate their crimes. For more information on fraud and scams, see the National Fraud Information Center, Internet ScamBusters or the Commodity Futures Trading Commission.
Scamsters are spamming fake contest "entries" also. When one of them was called on it, they subscription-bombed the person who did it. See the whole story.
Another typical claim is to spam offers for "free" web pages. Peter da Silva has a list of legitimate offers of free Web space.
Recently, someone forwarded me a spammed web site registry offer. They claimed they had a list of high-profile customers, including The New York Times, Iams and Inc. I forwarded a copy to The Times and received a call early the next morning not only disclaiming a connection to the spammer, but letting me know that they were ordering the spammer to stop using The Times' name in their advertising. See The Times' follow-up e-mail to me. My correspondent contacted Iams - see their response - and Inc. - their response. In a final fillip, the spammer is now being investigated for fraud - false advertising.
Spammers are also not above inventing their own testimonials. The Cybertize E-mail home page includes a bunch of quotes. The first one, allegedly from The Internet for Dummies is, according the the book's author, a complete fabrication and utterly opposed to his actual opinion about spam, and we have our doubts about the rest of the purported quotes.
E-mail spammers are even damaging Usenet. See Peter da Silva's story about getting e-mail spams after posting to Usenet for a short while. The sort of activity he describes scares people away from participating in Usenet.
Lastly, chain letter spams are not just rude, annoying, and spam. If there is money exchanged, they're illegal in the United States according to the United States Postal Service. For the definitive word on "Make Money Fast" chain letters, see the MMF Hall of Humiliation. See also what other users are saying about MMF, and take a look at some information on Pyramid schemes on Usenet. Additionally, you can now report apparent tax fraud and schemes to make unreported income to the IRS. email@example.com should be used to report them. Use firstname.lastname@example.org to report threats against the IRS or its employees, attempted bribery, or any other attacks on the integrity of the tax system. Do not use it for general spam complaints, and especially do not use an automatic filter to send mail there.
Q. Why do we get soooo upset when we receive E-mail which was not requested?
There are several reasons:
The free ride. E-mail spam is unique in that the receiver pays so much more for it than the sender does. For example, AOL has said that they were receiving 1.8 million spams from Cyber Promotions per day until they got a court injunction to stop it. Assuming that it takes the typical AOL user only 10 seconds to identify and discard a message, that's still 5,000 hours per day of connect time per day spent discarding their spam, just on AOL. By contrast, the spammer probably has a T1 line that costs him about $100/day. No other kind of advertising costs the advertiser so little, and the recipient so much. The closest analogy I can think of would be auto-dialing junk phone calls to cellular users (in the US, cell phone users pay to receive as well as originate calls); you can imagine how favorably that might be received.
The ``oceans of spam'' problem. Many spam messages say ``please send a REMOVE message to get off our list.'' Even disregarding the question of why you should have to do anything to get off a list you never asked to join, this becomes completely impossible if the volume grows. At the moment, most of us only get a few spams per day. But imagine if only 1/10 of 1 % of the users on the Internet decided to send out spam at a moderate rate of 100,000 per day, a rate easily achievable with a dial-up account and a PC. Then everyone would be receiving 100 spams every day. If 1% of users were spamming at that rate, we'd all be getting 1,000 spams per day. Is it reasonable to ask people to send out 100 ``remove'' messages per day? Hardly. If spam grows, it will crowd our mailboxes to the point that they're not useful for real mail. Users on AOL, which has a lot of trouble with internal spammers, report that they're already nearing this point.
The theft of resources. An increasing number of spammers, such as Quantum Communications, send most or all of their mail via innocent intermediate systems, to avoid blocks that many systems have placed against mail coming directly from the spammers' systems. (Due to a historical quirk, most mail systems on the Internet will deliver mail to anyone, not just their own users.) This fills the intermediate systems' networks and disks with unwanted spam messages, takes up their managers' time dealing with all the undeliverable spam messages, and subjects them to complaints from recipients who conclude that since the intermediate system delivered the mail, they must be in league with the spammers.
Many other spammers use ``hit and run'' spamming in which they get a trial dial-up account at an Internet provider for a few days, send tens of thousands of messages, then abandon the account (unless the provider notices what they're doing and cancels it first), leaving the unsuspecting provider to clean up the mess. Many spammers have done this tens or dozens of times, forcing the providers to waste staff time both on the cleanup and on monitoring their trial accounts for abuse.
It's all garbage. The spam messages I've seen have almost without exception advertised stuff that's worthless, deceptive, and partly or entirely fraudulent. (I include the many MLMs in here, even though the MLM-ers rarely understand why there's no such thing as a good MLM.) It's spam software, funky miracle cures, off-brand computer parts, vaguely described get rich quick schemes, dial-a-porn, and so on downhill from there. It's all stuff that's too cruddy to be worth advertising in any medium where they'd actually have to pay the cost of the ads. Also, since the cost of spamming is so low, there's no point in targeting your ads, when for the same low price you can send the ads to everyone, increasing the noise level the rest of us have to deal with.
They're crooks. Spam software invariably comes with a list of names falsely claimed to be of people who've said they want to receive ads, but actually consisting of unwilling victims culled at random from usenet or mailing lists. Spam software often promises to run on a provider's system in a way designed to be hard for the provider to detect so they can't tell what the spammer is doing. Spams invariably say they'll remove names on request, but they almost never do. Indeed, people report that when they send a test ``remove'' request from a newly created account, they usually start to receive spam at that address.
Spammers know that people don't want to hear from them, and generally put fake return addresses on their messages so that they don't have to bear the cost of receiving responses from people to whom they've send messages. Whenever possible, they use the ``disposable'' trial ISP accounts mentioned above so the ISP bears the cost of cleaning up after them. I could go on, but you get the idea. It's hard to think of another line of business where the general ethical level is so low.
It might be illegal. Some kinds of spam are illegal in some countries on the Internet. Especially with pornography, mere possession of such material can be enough to put the recipient in jail. In the United States, child pornography is highly illegal and we've already seen spammed child porn offers.