On Thu, Sep 22, 2011 at 11:27:41AM -0500, Dan Williams wrote:
> > right. the big problem is not working around a broken network or a network
> > with an attacker. The problem is false positives due to the pletora of
> > hotspot mangling techniques out there. Ideally, NetworkManager would deal 
> > with
> > the whole "hotspot detection" and lift any blocking done by the hotspot 
> > pre-login,
> > and then dnssec-triggerd in some way or shape can deal with the DNS 
> > investigation
> > and caching resolver reconfiguration.
> > 
> > For example, the Apple iOS hotspot detection consists of simple trying to 
> > fetch:
> > http://www.apple.com/library/test/success.html
> 
> There's long notes on how to do this in the TODO file in NM git, just
> needs the time to implement.  It's essentially what Windows does as
> well, they just fetch a known URL and compare the result to a known
> response, and if there isn't a match, you're not connected to the
> internet.  Various other plugins could check the response for known
> portal junk (and we can use the various portal auto-login standards like
> WPAD) to handle portal auto-login if we can.

  ConnMan (https://lwn.net/Articles/456967/) already has code to detect and 
login
on hotspot pages.  Maybe you can just lift code from ConnMan instead of redoing 
it.


-- 
Tomasz Torcz                Only gods can safely risk perfection,
xmpp: zdzich...@chrome.pl     it's a dangerous thing for a man.  -- Alia

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to