> On Nov 30, 2017, at 13:24 , Josh Luthman <[email protected]> wrote:
> 
> non-SSL requests are not the issue.
> 
> SSL requests are.  For example, Google cache's their 301 redirect from 
> http://www.google.com <http://www.google.com/> to https://www.google.com 
> <https://www.google.com/> which means clients that had access while that 
> browser ps stays active will still attempt https instead of http, regardless 
> of what you actually type.

Right, you’re talking about HSTS as I mentioned below.

However, if there’s a well known URL for getting the captive portal to work 
(e.g. http://captive.portal), then we educate users (or
browsers that they can type captive.portal (or whatever URL we choose) instead 
of google (which was my traditional go to before HSTS,
I admit) and voila… Problem solved.

I’m fortunate enough to have my own non-HSTS domain that I use for this purpose 
and it’s quite easy and effective.

Owen

> 
> 
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
> 
> On Thu, Nov 30, 2017 at 1:08 PM, Owen DeLong <[email protected] 
> <mailto:[email protected]>> wrote:
> 
> > On Nov 30, 2017, at 08:20 , Josh Luthman <[email protected] 
> > <mailto:[email protected]>> wrote:
> >
> >> If TLS  would somehow allow you to redirect...
> >
> > No but it would be nice to have a solution that redirects the user instead
> > of "this page can't load" creating confusion.
> 
> A well-known non-SSL (non-HSTS) URL that users could use for this purpose 
> would
> serve the same purpose without producing the security problems mentioned.
> 
> Owen
> 
> >
> >
> > Josh Luthman
> > Office: 937-552-2340 <tel:937-552-2340>
> > Direct: 937-552-2343 <tel:937-552-2343>
> > 1100 Wayne St
> > Suite 1337
> > Troy, OH 45373
> >
> > On Thu, Nov 30, 2017 at 2:02 AM, Jimmy Hess <[email protected] 
> > <mailto:[email protected]>> wrote:
> >
> >> On Wed, Nov 29, 2017 at 10:34 PM, Ramy Hashish <[email protected] 
> >> <mailto:[email protected]>>
> >> wrote:
> >>
> >>
> >>> Two points with this problem: 1)Is there a "non client" solution to the
> >>> problem of the WiFi login notification not showing up on the clients
> >> after
> >>> connecting to the WiFi network?
> >>>
> >>
> >> A  Captive portal  embedding WispR  XML data
> >> for connections from browsers/OSes that request a test page upon network
> >> access.
> >> https://stackoverflow.com/questions/3615147/how-to- 
> >> <https://stackoverflow.com/questions/3615147/how-to->
> >> create-wifi-popup-login-page
> >>
> >> However if WPA2 authentication is not method used for access,  then network
> >> traffic is
> >> vulnerable and not secured.
> >>
> >> AP solutions that are non-standard being a "Non client" solution and using
> >> "Open Wireless" mode SSIDs are likely so deficient in security as to be
> >> an unreasonable risk for users to actually connect to.
> >>
> >>
> >>> Second, anything to be done from the AP to show the landing page even if
> >>> the page requested is HTTPs?
> >>>
> >>
> >> If TLS  would somehow allow you to redirect or create a HTTPS connection
> >> from
> >> a domain name that is not yours, then this could obviously be exploited for
> >> attacks.....
> >>
> >> --
> >> -JH
> >>
> 
> 

Reply via email to