It's been a few years since I looked at this, and I might be missing context, but IMO, any attempts to redirect HTTPS using a MITM attack should be considered adversarial. One might not want to onboard a device in such a setting. If one does want to proceed, from what I read the process for navigating this safely is not clear. I wish I could be more precise in the criticism, but I'm not familiar with the background of what you are trying to achieve.

Dave

On 2025-06-30 18:07, Michael Richardson wrote:
Tommy Pauly <[email protected]> wrote:
>> Captive portals that do not follow the requirements of Section 1 of >> {{?RFC8952}} MAY forcibly redirect HTTPS connections. While this is a >> deprecated practice as it breaks TLS in a way that most users can not
    >> deal with, it is still common in many networks.

> I would question using a normative MAY here; clearly, it’s something > the network can do and often will do, but it seems like this is more a > statement of practice than saying “you MAY do this” as a thing we’d
    > recommend. I would probably say “might”.

I saw that too when editing, and I thought I changed it already.
Nope. Fixed now.

Any other thoughts?
Forced redirect of TLS by portals usually is detected by a certificate
validation failure. But, in 8995, we defer the verification until later on. What I want to know is whether this explanation is reasonably communicated.


--
Michael Richardson <[email protected]> . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide





_______________________________________________
Captive-portals mailing list -- [email protected]
To unsubscribe send an email to [email protected]

_______________________________________________
Captive-portals mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to