[Dnssec-trigger] dnssec-trigger at Hotel hotspot in Vienna
Carsten Strotmann (private)
carsten at strotmann.de
Tue Sep 20 19:56:27 UTC 2011
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 9/20/11 8:41 PM, Paul Wouters wrote:
> On Tue, 20 Sep 2011, Carsten Strotmann (private) wrote:
>
>> Not sure how this can be solved, maybe by having DNSSEC-trigger
>> to test a well known webpage of port 80 to detect a captive
>> portal. MacOS X 10.7 now also has an automatic captive portal
>> detection (ported from iOS). Not sure if there are APIs available
>> to use the function.
>
> I think it is :)
>
> http://www.apple.com/library/test/success.html
>
> The real question is should dnssec-trigger get involved here or
> not. Ideally, the OS or browser is going to do the portal
> detection.
>
> dnssec-trigger could decide to reprobe every 5 seconds if it sees
> this "portal" indicator? eg remain more aggressive while on a
> suspected landing page that hopefully soon will open up auth DNS.
>
> Paul
dnssec-trigger thinks it succeeds, effectively disabling MacOS X
portal detection, so if dnssec-trigger is executed before the portal
detection, the system fails. Sometimes dnssec-trigger is running after
the portal-detection, then it works.
- -- Carsten
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk547+kACgkQsUJ3c+pomYFxKwCeIZ3PCJMCNc7ctnq4ZkDE6DiZ
HZsAnAiG6L68eJSP1J91ijJUkSjPzJYP
=wY2W
-----END PGP SIGNATURE-----
More information about the dnssec-trigger
mailing list