From: Celejar on
On Fri, 02 Jul 2010 11:27:13 +0200
Merciadri Luca <Luca.Merciadri(a)student.ulg.ac.be> wrote:

> No. That's not at all a proxy. Once you power on the computer, and that
> you want to use Internet, say by Firefox, you are directly redirected to
> a webpage which asks you your university login & your university
> password. Once you have entered this stuff, you are logged on the
> network, and everything is okay. That's a little bit like ADSL where you
> need to type credentials before using the Internet (at the opposite of
> the cable).
>
> :-(

One way to do this is to implement a script that will do the
authentication automatically. Using Perl, you'd whip something
together using something like WWW::Mechanize.

Celejar
--
foffl.sourceforge.net - Feeds OFFLine, an offline RSS/Atom aggregator
mailmin.sourceforge.net - remote access via secure (OpenPGP) email
ssuds.sourceforge.net - A Simple Sudoku Solver and Generator


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/20100702130216.0eb092b4.celejar(a)gmail.com
From: Merciadri Luca on
Thanks.

Celejar wrote:
> On Fri, 02 Jul 2010 11:27:13 +0200
> Merciadri Luca <Luca.Merciadri(a)student.ulg.ac.be> wrote:
>
>
>> No. That's not at all a proxy. Once you power on the computer, and that
>> you want to use Internet, say by Firefox, you are directly redirected to
>> a webpage which asks you your university login & your university
>> password. Once you have entered this stuff, you are logged on the
>> network, and everything is okay. That's a little bit like ADSL where you
>> need to type credentials before using the Internet (at the opposite of
>> the cable).
>>
>> :-(
>>
>
> One way to do this is to implement a script that will do the
> authentication automatically. Using Perl, you'd whip something
> together using something like WWW::Mechanize.
>

--
Merciadri Luca
See http://www.student.montefiore.ulg.ac.be/~merciadri/
I use PGP. If there is an incompatibility problem with your mail
client, please contact me.


There is a thin line between love and hate.

From: Rob Owens on
On Fri, Jul 02, 2010 at 10:39:16AM +0100, Michal wrote:
> On 02/07/2010 10:27, Merciadri Luca wrote:
>> No. That's not at all a proxy. Once you power on the computer, and that
>> you want to use Internet, say by Firefox, you are directly redirected to
>> a webpage which asks you your university login& your university
>> password. Once you have entered this stuff, you are logged on the
>> network, and everything is okay. That's a little bit like ADSL where you
>> need to type credentials before using the Internet (at the opposite of
>> the cable).
>>
>> :-(
>>
>> Thanks.
>
> ...so you can only use a browser then? You can't use other applications?
> This sounds like the sort of system they have a hotels and such
> like...but there are ways to get around these...one way was even put in
> a Linux magazine a few weeks ago. Have a search around
>
I think the solution was to use opendns servers in /etc/resolv.conf.
The reason it works is that, according to the article I read, many of
these captive portal systems work by not giving you a dns server until
you enter your credentials. If you manually specify your own dns
server, you can avoid entering your credentials.

I've never tested it, but I know that the captive portal systems I've seen give you an IP
address before you enter your credentials. In fact, they have to give
you an IP address otherwise you couldn't get to the "credentials"
webpage.

-Rob


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/20100703020703.GA15350(a)aurora.owens.net
From: Celejar on
On Fri, 2 Jul 2010 22:07:03 -0400
Rob Owens <rowens(a)ptd.net> wrote:

....

> I think the solution was to use opendns servers in /etc/resolv.conf.
> The reason it works is that, according to the article I read, many of
> these captive portal systems work by not giving you a dns server until
> you enter your credentials. If you manually specify your own dns
> server, you can avoid entering your credentials.
>
> I've never tested it, but I know that the captive portal systems I've seen give you an IP
> address before you enter your credentials. In fact, they have to give
> you an IP address otherwise you couldn't get to the "credentials"
> webpage.

>From http://en.wikipedia.org/wiki/Captive_portal#Implementation

-----

Implementation

There is more than one way to implement a captive portal.
[edit] Redirection by HTTP

If an unauthenticated client requests a website, DNS is queried by the
browser and the appropriate IP resolved as usual. The browser then
sends an HTTP request to that IP address. This request, however, is
intercepted by a firewall and forwarded to a redirect server. This
redirect server responds with a regular HTTP response which contains
HTTP status code 302 to redirect the client to the Captive Portal. To
the client, this process is totally transparent. The client assumes
that the website actually responded to the initial request and sent the
redirect. [edit] IP Redirect

Client traffic can also be redirected using IP redirect on the layer 3
level. This has the disadvantage that content served to the client does
not match the URL. [edit] Redirection by DNS

When a client requests a website, DNS is queried by the browser. The
firewall will make sure that only the DNS server(s) provided by DHCP
can be used by unauthenticated clients (or, alternatively, it will
forward all DNS requests by unauthenticated clients to that DNS
server). This DNS server will return the IP address of the Captive
Portal page as a result of all DNS lookups.

The DNS poisoning technique used here, when not considering answers
with a TTL of 0, may negatively affect post-authenticated internet use
when the client machine references non-authentic data in its local
resolver cache.

Some naive implementations don't block outgoing DNS requests from
clients, and therefore are very easy to bypass; a user simply needs to
configure their computer to use another, public, DNS server.
Implementing a firewall or ACL that ensures no inside clients can use
an outside DNS server is critical.

-----

Celejar
--
foffl.sourceforge.net - Feeds OFFLine, an offline RSS/Atom aggregator
mailmin.sourceforge.net - remote access via secure (OpenPGP) email
ssuds.sourceforge.net - A Simple Sudoku Solver and Generator


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/20100704003916.9a4ebd2b.celejar(a)gmail.com
From: Merciadri Luca on
Celejar wrote:
> On Fri, 2 Jul 2010 22:07:03 -0400
> Rob Owens <rowens(a)ptd.net> wrote:
>
> ...
>
>
>> I think the solution was to use opendns servers in /etc/resolv.conf.
>> The reason it works is that, according to the article I read, many of
>> these captive portal systems work by not giving you a dns server until
>> you enter your credentials. If you manually specify your own dns
>> server, you can avoid entering your credentials.
>>
>> I've never tested it, but I know that the captive portal systems I've seen give you an IP
>> address before you enter your credentials. In fact, they have to give
>> you an IP address otherwise you couldn't get to the "credentials"
>> webpage.
>>
>
> >From http://en.wikipedia.org/wiki/Captive_portal#Implementation
>
> -----
>
> Implementation
>
> There is more than one way to implement a captive portal.
> [edit] Redirection by HTTP
>
> If an unauthenticated client requests a website, DNS is queried by the
> browser and the appropriate IP resolved as usual. The browser then
> sends an HTTP request to that IP address. This request, however, is
> intercepted by a firewall and forwarded to a redirect server. This
> redirect server responds with a regular HTTP response which contains
> HTTP status code 302 to redirect the client to the Captive Portal.
Is the 302 status code standardized? (I'm here dealing with CISCO
routers and network stuff, and do they use 302 too?)
> To the client, this process is totally transparent. The client assumes
> that the website actually responded to the initial request and sent the
> redirect. [edit] IP Redirect
>
> Client traffic can also be redirected using IP redirect on the layer 3
> level. This has the disadvantage that content served to the client does
> not match the URL. [edit] Redirection by DNS
>
/
> When a client requests a website, DNS is queried by the browser. The
> firewall will make sure that only the DNS server(s) provided by DHCP
> can be used by unauthenticated clients (or, alternatively, it will
> forward all DNS requests by unauthenticated clients to that DNS
> server). This DNS server will return the IP address of the Captive
> Portal page as a result of all DNS lookups.
>
> The DNS poisoning technique used here, when not considering answers
> with a TTL of 0, may negatively affect post-authenticated internet use
> when the client machine references non-authentic data in its local
> resolver cache.
>
> Some naive implementations don't block outgoing DNS requests from
> clients, and therefore are very easy to bypass; a user simply needs to
> configure their computer to use another, public, DNS server.
> Implementing a firewall or ACL that ensures no inside clients can use
> an outside DNS server is critical.
>
Thanks for this.

--
Merciadri Luca
See http://www.student.montefiore.ulg.ac.be/~merciadri/
I use PGP. If there is an incompatibility problem with your mail
client, please contact me.


Act today only, tomorrow is too late.