I just moved into a student dorm for a semester abroad, and beforehand I emailed them asking whether they had ethernet ports to plug my router into (I use it to connect all my devices, and for WiVRn VR streaming). They confirmed that I could, but now that I’m here the wifi login portal is asking me to accept these terms from the ISP, which forbid plugging in a router. There’s another clause that forbids “Disruptive Devices” entirely, defined as:
“Disruptive Device” means any device that prevents or interferes with our provision of the 4Wireless to other customers (such as a wireless access point such as wireless routers) or any other device used by you in breach of the Acceptable Use Policy;
So what are my options? I don’t think I can use this service without accepting the terms, but also I was told by the student dorm support that I could bring a router, which contradicts this.
EDIT: some additional context:
- dorm provider is a company separate from my uni (they have an agreement but that’s it)
- ISP (ask4) is totally separate from dorm provider, and have installed a mesh network that requires an account. On account creation, there are many upsells including one for connecting more than one device. The “free” plan only allows me to sign in on a single device, and I can upgrade to two devices for 15 pounds.
- ethernet requires login too
- VR streaming requires a high performance wifi 6 network, which is why I bought this router (Archer C6 from tp-link)
I work in university IT so I have some experience here. Some schools are better than others but in general providing IT services for students is like trying to wrangle a herd of starving feral cats who are all in heat.
First of all I have never seen 802.1x implemented (Ethernet authentication) in the wild that wasn’t almost immediately removed. It’s a shitty protocol that’s terrible to debug. I totally get why they restrict APs … my god if every student had one it would be a pain. It would be like standing in a crowded room with everyone shouting and you’re trying to pick out one conversation 20 ft away.
My guess is you’re basically in a situation like my son was at ECU. It’s likely not really a university dorm but closely affiliated hence the reason of a third party. Or the central university IT is abysmal and can’t be bothered. Either way the only reason to use 802.1X is because they think it’s more secure, when in fact it’s way more trouble than it’s worth. You can do the same thing by controlling downstream routing or MAC filtering. The ECU “dorm” did that and it wasn’t much better honestly. You had to go into a website to add your MAC address to get access to the WiFi. Firstly how do you do that when your computer can’t talk to anything. Chicken and egg problem. Secondly for the ones who figured out how to do that using your phone, good luck getting a history major to figure what even what a MAC address was.
My suggestion is don’t bother. If they’ve implemented 802.1x they’re a micromanaged IT and will catch you eventually. I’d also guess they have completely overtaxed their egress traffic and your speeds are abysmal.
On a related note, when you graduate never ever rent from an apt complex that generously process WiFi or Ethernet. It will almost always suck, they will have no one to provide adequate tech support, and they are just using it as another revenue stream.
Sorry I don’t have better advice but if they control the network there isn’t really much you can do.
I was once responsible for a student house (we don’t have dorms in the US sense, this is the closest we have) and I have similar experiences but less extreme. My favourite was when I had forgotten to configure DHCP filtering and someone plugged in a router the wrong way so it started offering DHCP (that didn’t work) to everyone in the building, in a race with our upstream ISP.
Also, the times rats got into the networking room and ate random cables. I should add the network was built by volunteer students in the ‘90s.
I did this a work one time… sorta the same thing. I installed pfsense VM and left the DHCp server on. I killed the network in our office for about 15 minutes.
pretend you didn’t read it and press the button
Connect your PC to the network then run internal networking as you like through a 2nd interface?
That seems pretty standard stuff. My dorm had the same policy, because they operated their own mesh network and didn’t want students sending out their own radio signals that would have absolutely made their wireless network not work well.
Is there some reason you need your own router?
ETA: The student dorm people probably meant a network switch. Regular, non-techy people don’t usually know the difference between a router and a switch.
Yeah, the interference argument is fair, but I think this is also the ISP (totally separate third party) trying to protect the paid plans they sell for connecting more than one device…
trying to protect the paid plans they sell for connecting more than one device
It’s definitely 90% of the reason
So it’s a network operated by a third party? That’s interesting. The handful of universities I’ve been to maintain their own.
Where I went to school, originally the dorms were on the university network but a year in they offloaded us onto regular, commercial ISPs. The change was great for us since the university network was very strict on stuff like torrents (using DPI any torrent, even legal, got you disconnected for 24h)
My university had student apartments, each had their own router. No weird rules since it wasn’t the university’s network at all, it belonged to whoever lived in the apartment. Full router access, connect whatever, put it in bridge mode and connect your own if you want.
If there’s enough space between them, it would be less of an issue. If it was in a multifamily high rise with hundreds of units, I would expect it to cause issues.
Is this a problem with 5G networks? There are more channels and they don’t go through walls as well, right?
Tl;Dr It’s complicated.
Do you mean 5Ghz networks (5G is cellular tech, after all)? If so, 5Ghz can travel through walls, but it doesn’t travel as far, because there’s an inverse relationship between range and channel width. Also, 5Ghz has a shorter wavelength; some of the signal’s light will get absorbed by the walls, but not all of it.
Ultimately, you’d still have the same problem: too many radios sharing a limited range of frequencies on a band would interfere with each other if sufficiently close.
It would be akin to having everyone playing different music at full volume on their own personal speaker; you’ll inevitably hear the people closest to you. Radios can’t “hear” anything outside of their chosen frequency (channel), but if other people nearby are also on that channel, you might catch or lose some unintended packets, triggering a resend event (TCP) or causing stuttering/lag (UDP).
The number of channels available for 5Ghz varies by country, with the EU having the most, iirc. In the US, if you try to force your router to use one of the blacklisted channels, your devices will likely not connect (unless they were directly imported), despite being able to use the 5Ghz spectrum.
In that case, just set up a router level VPN. The university probably doesn’t give a shit. Which is why the help desk IT kid said it’s fine, probably.
It’s the 3rd party ISP just being greedy. The ISP may not even care as long as you’re not running an insane amount of traffic through it. Often this type of stuff is added to TOSs to allow them the option, if you’re being a bad actor.
Shit, ask4? I think they were the isp when I was at uni about a decade ago. I’m sorry to hear they’re still kicking.
If it’s still the same as back then, all the dorms are essentially on the same lan and they’re using Mac filtering at the gateway. Since this was before Https became ubiquitous this meant you could sniff other people’s http requests.
What you do (what we did) was sign up with one device and setup a proxy on it. I think we used squid-cache. But anything that will masquerade the traffic as coming from that one device should do the trick.
Yes, i think squid proxy would do the trick too. It even has installers for windows.
As someone who has administered networks and written policies like this the concern here is that you will run an open network that may be used for piracy, hacking, DDOS or to send bomb threats. Tracing down this type of behavior is required by law and allowing students to run open networks makes this near impossible.
Not only that, but managing wifi channel congestion in a dorm is a pita.
It’s tough enough when you fully control the airspace, to have nice clean coverage and overlapping cells.
But then add dozens or hundreds of individually managed APs in a tiny space…with DFS and/or 160MHz channel widths?
Ops best bet is to get their own 5g home internet and plug in.
You’ll be hard pressed to get a router to talk to a captive portal sign in…but if OP wants to get creative, this can easily be fixed with a dumb switch and a Linux PC with two NICs. You could use windows for this, but why would you?
Mine didn’t either when I lived in a dorm. I got around the network block.
- Plug Xbox 360 into ethernet wall port
- Log into uni network, get internet
- Plug router directly into pc.
- Assign router same ip as Xbox
- Spoof router mac address to match xbox
- Unplug from pc
- Quickly swap cable in wall from Xbox cable to router cable, Indiana Jones style
- Internet for 1 month. Repeat monthly.
this gives me playstation 1 CD swap vibes
(inserting a legal cd to pass verification and then swapping it for your own cd)
TIL you aren’t a wireless professional until your hacks comes with a cinematic soundtrack.
You’re not a wireless professional if you use wired ethernet cables…
Honestly this sounds like a bit of a pickle. If I were in your situation I would just use one of the cellular carriers 5g internets. I personally use a T-Mobile 5g internet hotspot with a fresh tomato flashed nether 6700 plugged into it. Then I basically do all of my networking from that. Latency is a fair bit higher (usually about 30-50ms) but upload is significantly better than spectrum.
I remember when I was in college running a hackintosh. I was at the end of the hall and had awful Wi-Fi reception, so I just had my desktop emitting Wi-Fi for me and my dorm mate. I pirated some stuff but never seeded. I told my roommate about pirating and whatnot and showed him how to pirate Parks and Recreation. He didn’t turn off seeding. The university banned my MAC address, but luckily I could spoof one and have internet. He had to go to the dean and tell him he was sorry and that he won’t do it again to get my hardware MAC banned so I didn’t have to change it every time I booted up.
The fact that it was so simple for me to get around this ban was hilarious.
As someone whose job it is to deploy and manage wifi at a small university-adjacent student accommodation, these are similar to my rules. There are enough students that know enough to cause a problem, but not enough to know the pitfalls. It’s best to just blanket cut this off for everyone’s best experience.
Can you give some examples of issues you mention?
A few stories:
I’ve had a student install a super cheap (g only) repeater to provide wifi to their car in the car park, due to its location a number of students ended up using that rather than our APs. This slowed access for them dramatically.
I’ve had a student physically remove an AP to get to the 2.5 gigabit port they connect to, they somehow thought that would be better than the 1G they have in their rooms, despite it all being the same link out.
An overseas student cloned a MAC of their device to a travel router and effectively ran a VPN server for their family to try and give them an IP in our country.
The accommodation only has an hour of my time per week or so, they’re not paying a lot so issues only get dealt with when I have the time for them, this leads to an extended period of bad access for folks and many complaints to the staff.
The main point of the story is that not all students take the experience of their neighbors into account. Hence the restrictions.
The difference here is that the ISP is up charging for multiple devices, meaning this isn’t all being done for benevolent reasons.
The way many apartments work for non-students is each has its own WiFi. Honestly compared to how bad some Hall’s WiFi is this is a better option, but it’s not without problems. A lot of ISP routers either don’t support or don’t turn on by default DFS channels, 5.8GHz channels, 6 GHz band, or have WiFi 6 for BSS colouring. This means there will be loads of interference between adjacent WiFi networks.
It’s really frustrating especially when you have ISPs like Virgin whose kit has DFS support, but despite touting smart wifi they just never enable it, and most people don’t know to enable it either.
Yea that is true, there’s definitely either a profit motive or they don’t think they have the bandwidth for everyone to have multiple devices and are this introducing an up charge/scarcity to cover up that.
The site I look after we have a restriction on device numbers, 5 per room. Even that is flexible and not really enforced as in reality the network will be fine with thousands even. The main restrictions are about device behavior and preventing causing interference or outages.
There’s only 120 rooms in the site I look after so it’s not massive.
We’re running W-Fi 6 with all channels enabled including DFS channels. We’ve great coverage (roughly one access point per 4 -6 rooms in a 90s building).
Not OP, but I’ll add on some more complications.
Your network is designed with the minimum number of access points you need to have really good coverage. Adding more access points to the rooms increases interference and takes up usable frequencies. Rogue access points are hard to find and university IT has very limited resources.
That enterprise gear of the colleges using it’s part of a bigger picture system with alerts and alarms and the ability to see an address problems and locate issues effectively.
Man, things sure have changed since I was in college. The university had one /15 and three /16s so every single ethernet port everywhere on campus had a publicly routable IP.
Napster was so goddamn fast…
Full 10Mbps line speed!
The reason they don’t want you using your own WiFi access point is probably because dorms are prone to over congestion if everyone sets up their own WiFi network.
If you wanted to fuck with them-and you don’t mind spending money-then you could set up your WiFi and get internet via mobile carrier or starlink, so that you never actually have to agree to their terms. Then when/if someone comes around to bitch at you you can watch them slowly come to the conclusion that they’ve got nothing on you.
Otherwise your options are to follow the rules to the letter and live without vr streaming, or accept that you might get in trouble. Some WiFi routers can be configured to not advertise their network; annoying because you’ll have to manually enter the network information on every device, but it might keep you from getting caught.
As for connecting multiple devices without paying; there’s probably some creative ways to tunnel all your traffic through a single device to get around that. Could still get you in trouble if you’re caught.
If you’re doing anything that could get you in trouble with the school make sure you save the email in which they told you using your own router is allowed.
Ah such a masterful plan, paying for your own internet
Tbf you’re paying for the college to provide you internet.
Ah but that one isn’t your own it’s shared
I got news for you about almost every ISP
Some WiFi routers can be configured to not advertise their network; annoying because you’ll have to manually enter the network information on every device, but it might keep you from getting caught.
Just name the network something like Samsung S20 Personal Hotspot. They’re not gonna look into why a student created a Hotspot with their phone.
Or, shit - lock the fucking door.
If it’s a dorm they have the key.
IT does? Damn, didn’t know - my bad. Where I’m from IT doesn’t have the keys, and the people that do have the keys know better than to try entering people’s dorms, unless it’s really something critical. Wifi doesn’t qualify.
Where I went to college, they probably didn’t directly have the key, that’d have to go through maintenance. But one of the things you signed on to initially was for maintenance to enter if they needed to while you were out.
Plus, at least half of the WAPs were actually in rooms and not hallways, so to service the network beyond IDF problems they’d have to get in
You don’t actually need internet for the VR streaming part, so you could just set up a router not plugged into the wall
You do if you are rendering in the cloud, e.g NVIDIA CloudXR. Not sure what OP plans to do.
NVIDIA CloudXR
that’s an incredibly tiny edge case.
Sure yet it’s a perfectly legitimate one. I’m not OP, it might be exactly their use case.
in a dorm room?
realtime cloud VR rendering for use in a dorm room?
A lab, sure.
A dorm bedroom?
pfft
I’m not sure if you played PCVR in the Summer but imagine that in a tiny room… it’s just way too hot. Again I’m NOT saying it’s good, or bad, I’m only saying you made assumption about OP usage. I’m not sure if you tried CloudXR but basically, it works and it’s not that complex to setup (e.g 1h) so it’s relatively faster and cheaper than building and owning a gaming PC.
I don’t understand why you are even arguing about a legitimate usage.
because I’ve been into vr for about a decade and know no one who uses cloudXR. 120hz ain’t gonna happen over a college dorm network. 90hz on quest 2 would be very challenging.
wait, you realize, his requirement for streaming has NOTHING to do with cloud rendering right?
psst
Hey, kid, don’t tell anyone I told you about this
*Lifts coat
iodine
https://code.kryo.se/iodine
Description: tool for tunneling IPv4 data through a DNS server
This is a piece of software that lets you tunnel IPv4 data through a DNS
server. This can be usable in different situations where internet access is
firewalled, but DNS queries are allowed.You got the goods! I used an HTTP tunnel when I was in college.
I also like the idea of ptunnel
Ptunnel is an application that allows you to reliably tunnel TCP connections to a remote host using ICMP echo request and reply packets, commonly known as ping requests and replies.
I don’t understand how that can be reliable without being extremely obvious.
Yeah, any off the shelf network intrusion software would probably immediately flag either of those based solely on the amount of traffic.
Well it would be obvious. Any decent network tool would be able to filter traffic on a port or type (ICMP, DNS, etc).
“Wonder why this kid has 2.5Gb of DNS traffic last week? That isn’t normal. Maybe we should go check it out”
The trick to staying hidden is to look like noise. And this would not be noise.
In 2014 when I was in the hospital for a week I got a visit from their IT. Seems like pushing 5 to 10 gig a day through a ssh connection triggered something. Just a gig of ICMP of any variety would trip a alarm.
Man, I wish I knew this back then. I used Google translate as a proxy. Then that was blocked, so I used babelfish’s built-in translation engine which was touch and go. This would have helped a lot lol
This is a very neat tool that I’ve bookmarked for further research. But I think you’re missing the point. He doesn’t need to hide network traffic, he needs a Wifi6 router. Now maybe you could setup a router to go through this service to further obfuscate the traffic but I don’t think this alone solves his purpose.
But I’m very glad you posted it because I love learning about little tricks like this to get around overly restrictive networks.
Does it work with DoH ?
No, this is specifically for DNS over UDP (Port 53). What you’re looking for is just an HTTPS proxy. There is no difference between a DoH connection and any other HTTPS connection.
Except on my networks all port 53 tcp/udp and port 853 for that matter are forwarded to my dns per firewall rules. I also block all encrypted dns as well as dns over https blocked. Its my dns or nothing. I also have a vpn and proxy blocklist that updates twice a day. PFblockerNG is effective when maintained.
I love things that can route internet over something that should not be used for that. For example I’m thinking of making same thing over SMS and Veloren/Minecraft (or anyother videogame)'s private chat or something.
Oh, you are going to love this one then if you haven’t seen it before: https://robertheaton.com/pyskywifi/
Is the VR streaming in the Local net (PC to Headset)? Just run the WiFi router without plugging it into the wall. Connect only the pc and the headset.
Also, appart from that, to use more wired devices, maybe use an unmanaged switch. Don’t think that does anything forbidden here.
Users are often dumb. Imagine 100 people who think they know what they’re doing trying to set up a bunch of custom networking.
That’s your dorm.
Most dorms either outright prohibit using personal hardware like that or require the schools IT department to install it themselves and set it up.
Run a network of your own someday and you’ll understand. It’s hard enough to get your own network working perfectly without a bunch of wildcards popping up everywhere.
Do you know how many times I have killed my own network at home and I control EVERYTHING!! I’m the only wildcard…. Of course I have ADHD and documentation is not my strong suit 🤣
I’ve never seen this happen. The reality is unless it’s a dorm full of CS students most don’t know fuck all about WiFi, networks, or want to pay for their own routers. It’s better to talk to the few who would attempt something like this.
No what this actually is is the ISP trying to make money charging for more devices.
If someone deploys their router using a uni network as wan then I don’t see how that could affect other uni network users? I can imagine some internal services might not work behind such a router but it would be illogical of the user to blame anyone but themselves.
deleted by creator
If everything is set up perfectly, it should work, sure. Now how many people do you think even know the difference between WAN and LAN? You expecting the bio or art major to not make any mistakes at all? Or the business major?
But if the bio or art major can seriously affect your network then is that even their fault? What if someone had skill and malicious intent?
Lmao you are oblivious if you think it’s possible to set up a network that someone CANT fuck up while having physical access to it.
It’s not magic.
The point is NETWORKS ARE COMPLICATED. Users are generally dumb. The point is you don’t expect them to have the knowledge to do it right. So they’ll break something. Users with actual knowledge could yes, break things even worse.
That’s EXACTLY why they’re restricting hardware use.
Welcome to the conversation, smh
I do know from experience that networks are complicated and users are dumb, but I still think that if someone with barely any knowledge and without malicious intent can mess with your network then something’s wrong with the setup.