Thats a clever way of doing it, that would solve the IPv6 issue as well.

On Fri, Aug 26, 2016 at 2:47 PM, David Bird <db...@google.com> wrote:

> The DHCP option, once set, remains constant. The client learns the URL
> from DHCP Offer/ACK.
>
> For an example:
>
> Client sends DHCP Discover/Request
> NAS returns DHCP Offer/ACK containing:
>    Assigned IP: 10.0.0.100
>   Gateway IP: 10.0.0.1
>   CAPPORT URI: http://10.0.0.1:3990/prelogin
>
> [Chilli is the daemon responding to DHCP and is listening on 10.0.0.1:3990
> ]
>
> The client can issue a HTTP request to http://10.0.0.1:3990/prelogin and
> the NAS returns with a HTTP 302 redirect to something like
> https://my.domain/wifi?mac=... -- with session/station specific values.
>
>
> On Fri, Aug 26, 2016 at 11:29 AM, Alexander Roscoe <
> alexander.ros...@gmail.com> wrote:
>
>> Hi David,
>>
>> I am not too familiar with CoovaChili internals,  does the hijacking
>> routine add the string params(station/session) to the DHCP option or is it
>> scripted to use the option82 data and add the parameters after the user
>> goes to http://<nas-ip>:<port>/prelogin?
>>
>> On Fri, Aug 26, 2016 at 2:00 PM, David Bird <db...@google.com> wrote:
>>
>>> RFC 7710 says, ".. provides the URI to access an authentication page."
>>> Obviously, this will need further clarification should it point to an API
>>> end-point. As it is written, I think it is clear that the URI should be the
>>> same (or will redirect you to the same) URL as a HTTP hijack takes you to
>>> (minus any "original URL").
>>>
>>> In CoovaChilli, at least, there is already an internal/local URL that is
>>> suitable for RFC7710. In that the URL http://<nas-ip>:<port>/prelogin
>>> in chilli hooks into the hijacking routine to redirect the user to the
>>> captive portal URL specific to them (e.g. the hijacking routine adds the
>>> query string params specific to station/session).
>>>
>>> https://github.com/coova/coova-chilli/pull/274/commits/1e95a
>>> 2cf97e981f2f53826e38cd12372555a809c
>>>
>>>
>>> On Fri, Aug 26, 2016 at 10:08 AM, Dave Dolson <ddol...@sandvine.com>
>>> wrote:
>>>
>>>> Alexander,
>>>>
>>>> Suppose instead of providing a URL for the landing page, the RA
>>>> provided the URI for a standardized REST interface; the client could post
>>>> its details (MAC address, device type?) to this interface, which would
>>>> return the URL for the browser landing page, and possibly any number of
>>>> other details and mechanisms, e.g., in a JSON response.
>>>>
>>>>
>>>>
>>>> This adds a level of indirection that simplifies what needs to go in
>>>> the RA.
>>>>
>>>>
>>>>
>>>> I think there is also flexibility in letting the client know details
>>>> about the capport situation in the API. E.g., how often will the page need
>>>> to be visited?
>>>>
>>>>
>>>>
>>>> RA-->client:  “This is the URI for getting capport info:
>>>> http://capport.example.com/api”
>>>>
>>>> Client-->capport/api: “My MAC address is 01:02:03:04:05:06 and my IP
>>>> address is …”
>>>>
>>>> Capport/api-->client: “Your landing page is
>>>> https://capport.example.com/landing/mac=01:02:03:04:05:06 ; refresh
>>>> every 60min”
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> -Dave
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> *From:* Captive-portals [mailto:captive-portals-boun...@ietf.org] *On
>>>> Behalf Of *Alexander Roscoe
>>>> *Sent:* Friday, August 26, 2016 11:15 AM
>>>> *To:* captive-portals@ietf.org
>>>> *Subject:* [Captive-portals] IPv6 RA URI option
>>>>
>>>>
>>>>
>>>> I am looking over RFC 7710 <https://tools.ietf.org/html/rfc7710>
>>>> concerning how the URI is communicated to the end user.  I really like the
>>>> IPv4 DHCP solution,  I think this could easily be implemented in a DHCP
>>>> server.  I think it could be easily implemented in the RA for IPv6 as well
>>>> however I do see a challenge when each connected client needs a unique URI
>>>> such as it containing the parameter for the client mac. For example, a url
>>>> like https://captiveportal/?client-mac=11:22:33:44:55:66. The RA is
>>>> sent to everyone and cannot be tailored to each client while DHCP is very
>>>> client specific and can be changed on-the-fly.  Most captive portals rely
>>>> on the client mac address during the authentication process. I am aware of
>>>> networks using the IP address to associate the user at the AAA server but
>>>> from my understanding this is a rare network setup.  I think a potential
>>>> solution for the IPv6 RA would be to define an HTTP POST parameter in which
>>>> the client can use like ‘client-mac’ and let the client post it the URI
>>>> https://captiveporta/.   Thoughts? Ideas?
>>>>
>>>>
>>>> --
>>>> Alexander Roscoe
>>>> 484-716-9048
>>>>
>>>> _______________________________________________
>>>> Captive-portals mailing list
>>>> Captive-portals@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/captive-portals
>>>>
>>>>
>>>
>>
>>
>> --
>> Alexander Roscoe
>> 484-716-9048
>>
>
>


-- 
Alexander Roscoe
484-716-9048
_______________________________________________
Captive-portals mailing list
Captive-portals@ietf.org
https://www.ietf.org/mailman/listinfo/captive-portals

Reply via email to