Few days ago I read that topic which it was about hacking the hotspot.
I just wanted to give more details about this issue because the same thing happened with me also and I still didn’t figure a way to sort it out
This is a part of my network digram
In my network, I Have three outdoor access points connected to sector antenna in turn. All of the APs are connected to hub. The ether2 (Local) port in my MT box is connected to the hub as well to distribute the hotspot service. I didn’t set any security in my access points, it is very important to me that any subscriber can easily connect to my network as it possible.
Since my wireless network is open for anyone, some subscribers reported that they get the "conflict IP address" message several times. I told them just to make repair and it will be solved, but later I found out what was going on.
Anyone able to connect to my wireless network can make an IP scan and copy the IP address and the associated MAC ID from IP scan result. The intruder will set his computer IP address to the same one from the IP scan and using a simple program to clone the MAC ID or from the device manager proprieties can change the MAC ID. Now if the host IP logged in using his username and password, then intruder will be able to use the internet service without typing username and password since the host IP is logged already.
Other WISP reported the same thing happened with them. I tried it myself and it worked, I cloned an IP address and MAC ID to my laptop and I was able to use the internet without typing my username and password.
I thought the problem is from the hotspot itself. I thought to see whether the problem from the hotspot or not, I reconfigured another MT box as a router only, and I connected two laptops with the same IP address and MAC ID, I just got the "conflict IP address" message, but both machines use the internet properly.
I dont think if I will block the scanning ports to prevent the useres from doing an IP scan will help in my case, becasue the IP scanning process is done at the access points and MT can't block the access points.
Number of sessions per user is only one, and this won't change anything since I used the MT as router only in my experiment to define where the problem might be.
I am going to email this to MT, but I thought to share it with you guys to see if someone faced it already and can help us to sort it out.
Regards
Salah