I’d like to hear from browser vendors as to why the browser gets sandboxed when interacting with a captive portal.
If one could trust the URL came from the local network (via DHCP), could restrictions be lifted?
If the URL were HTTPS, and certificates were valid (e.g., valid cert of Chicago OHare Airport), could restrictions be lifted?
Because as we’ve heard, portals try to defeat captive portal detection to get the “real” browser: cookies, video player, etc.
-Dave
From: Captive-portals [mailto:captive-portals-
[email protected] ] On Behalf Of David Bird
Sent: Tuesday, April 4, 2017 5:35 PM
To: Christian Saunders
Thanks Christian,
I wanted to high-light something you said:
On Tue, Apr 4, 2017 at 1:13 PM, Christian Saunders <[email protected]> wrote:
I agree that determining the operators intention for the portal isn't really worthwhile.
On the other hand, it is worth providing the operators with tools to enable as seamless an experience as possible.
This is exactly right... the (consistent) and seamless an experience as possible.
However, today this sometimes means tricking UE captive portal detection into not giving you the 'other' browser (sandboxed, incognito, or otherwise not the browser the user is already logged into sites with). For people who build fancy websites for Hotspots, you can imagine that is frustrating (to require users to login, every time, even when your site uses HTTPS and cookies are "safe").
Beyond this the operators will sink or swim on their own merits.
Cheers!
Christian
Shaw Communications Inc.
On 17-04-04 02:05 PM, David Bird wrote:
Attribution / advertising is a big motivator, at least in the US.
On Tue, Apr 4, 2017 at 1:00 PM, Kyle Larose <[email protected]> wrote:
I was sitting in a coffee shop on Saturday in Chicago, and decided to log in to their wifi. It was a captive portal that basically said something like “Hey, we’re giving you this service for free, because we’re [the coffee shop] awesome!”. To log in I just needed to click a button to continue.
The point here, I think, is that the coffee shop is providing this as a service to you, and wants you to know that. I’m not sure how much that is worth to them, but it’s an example of something that isn’t just ToS, and wasn’t terribly intrusive.
From: Captive-portals [mailto:captive-portals-
[email protected] ] On Behalf Of David Bird
Sent: Tuesday, April 04, 2017 3:52 PM
To: Mikael Abrahamsson
Cc: [email protected]
Subject: Re: [Captive-portals] Arguments against (any) Capport "API"
My opinion is that guessing why venues put up a portal isn't always that useful. The point is, they have a reason. In some countries, there are legal requirements to display ToS. While we could try to implement ways around ToS type portals, are we helping the venue be more compliant? In all jurisdictions? (Some laws *require* the ToS is displayed *every time*).
For some locations, they may simply WANT to annoy you! (While also collecting per session fees from Boingo or iPass for the privileged of skipping that annoying portal.) More than likely, however, sites like the one you mentioned are just themselves concerned about liability and want that minimal amount of disclaimer...
As a user, you should either be willing to view the portal, pay for ease of use, or find another network...
David
On Tue, Apr 4, 2017 at 12:43 PM, Mikael Abrahamsson <[email protected]> wrote:
On Tue, 4 Apr 2017, David Bird wrote:
The one area I do see value in solving is how to get headless IoT devices on-line on capport networks.. But, in some ways, all we need their is a WISPr client in the device and an out-of-band way of configuring credentials into it. That can be solved with existing protocols and technologies.
I only have experience with captive portals as a user. When I travel the world, I have frequently seen captive portal pages that as far as I can see, offer nothing apart from a login page. It might have the hotel name in there, but that's it. So then I have to manually do something like find the piece of paper where my username/password is, and enter that. It seems to be only about authenticating me as actually being a resident of the hotel or whatever venue it is. Sometimes it seems to be there because there are legal requirements for tracking (they will write down a log of my room number and username on the paper in a ledger).
It's extremely cumbersome and as far as I can tell, it adds nothing for the WISP (at least nothing I can tell) by means of marketing or alike, it's only for assuring that people in the street can't just use the wifi.
Do you know the motivation for doing this in the context of your email? Is there added cost for them to automate the behavior, as in IPR or other licensing cost for them to use the automation tech that perhaps is already available in my mobile device?
--
Mikael Abrahamsson email: [email protected]
_______________________________________________ Captive-portals mailing list[email protected]https://www.ietf.org/mailman/listinfo/captive-portals
_______________________________________________
Captive-portals mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/captive-portals