I gave up, too many people now don’t even go to web pages.  Just video 
streaming, phone apps, and game networks.  They just perceive it as my Internet 
is down, they never see the redirect page because they aren’t even using a web 
browser.  At that point, you might as well just shut them off and wait for them 
to call.

 

I’m always amazed if we have an outage, how many people call to pay their bill.

 

 

From: AF <af-boun...@af.afmug.com> On Behalf Of Adam Moffett
Sent: Tuesday, September 10, 2019 8:31 PM
To: AnimalFarm Microwave Users Group <af@af.afmug.com>
Subject: Re: [AFMUG] HTTPS redirect

 

Ok, 

This is not bad at all, but only works with WiFi.....I'm on ethernet in the lab 
and I was sitting here beating my head like an idiot wondering why it didn't 
work.  Just something to keep in mind.  This is probably what I'll end up doing 
though.  I appreciate the tip.




On 9/10/2019 7:04 PM, Jesse DuPont wrote:

Redirecting HTTPS, as you know, doesn't work because of the certificate. Even 
using your own certificate won't work because you can't get a trusted 
certificate issues that is valid for all domain names.
The only think you can do is redirect them BEFORE they try to do HTTPS by 
triggering the captive portal detection methods in modern OS's - like they're 
in a hotel.

https://success.tanaza.com/s/article/How-Automatic-Detection-of-Captive-Portal-works

As you can see in that doc, all devices try to reach a known URL and expect to 
see a well-known result. If the result is different than what it expects, it 
assume it's behind a capture portal. We exploit this (in a non-black-hat-hacker 
kind-of-way).

Our billing system is tied to our RADIUS server so when a suspended account 
authenticates, RADIUS sends an additional attribute (instead of denying it) - 
basically an address-list entry. We use this additional attribute on routers to 
treat traffic from these people differently. Primarily:
1) We DST-NAT all their DNS queries to a fake-master server which issues our 
"you haven't paid" landing page IP for ANY DNS query they do  except for our 
website and billing portal, which are right (this is the first part of 
triggering captive portal detection - the IP returned to the OS isn't right).
2) We DST-NAT all their HTTP traffic to the proxy configured on the router, 
which triggers the second part of triggering captive portal detection - the 
HTTP server doesn't return the expected response. Also, using the proxy, we 
allow them to be able to reach our walled-garden content (our web page, our 
billing system portal) using the actual URLs, not just the IP. All other 
requests are redirected to our landing page.
3) In the firewall, even though we've essentially blocked it in the proxy, we 
only allow traffic from suspended customers to reach our landing page, our 
payment portal and our web site (the walled-garden).
4) Once they pay, they reboot their router and it's resolved.

I can share specifics if you want.

Jesse DuPont

Network Architect
email: jesse.dup...@celeritycorp.net <mailto:jesse.dup...@celeritycorp.net> 
Celerity Networks LLC

Celerity Broadband LLC
Like us! facebook.com/celeritynetworksllc



Like us! facebook.com/celeritybroadband
  
<file://Users/jessedupont/Google%20Drive%20File%20Stream/My%20Drive/Celerity%20Broadband%20LLC/Marketing/Celerity%20Broadband%20Final__04.12.2015/Source%20Files/Celerity%20Broadband_cv-sig.png>
 

On 9/10/19 4:05 PM, Adam Moffett wrote:

I already know the answer I think, but if you're redirection non-pay customers 
to a web page what do you do with (the majority) who have an HTTPS home page? 

do you 
A) present your own certificate and expect them to click through the warnings? 
B) Don't bother and just drop https? 
C) do something else? 

I told the boss if there was a way to do this then we should quit the ISP game 
and make a killing with phishing scams, but he seems to think there's a way to 
handle it. 

Thanks, 
Adam 



 

 

-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to