On 02/07/2013 12:13 PM, Dan Wing wrote:
The technique used by both Apple and Microsoft is, when joining a new
network, to attempt to retrieve a certain URI.  Microsoft's procedure
is described in
http://technet.microsoft.com/en-us/library/cc766017%28v=ws.10%29.aspx,
which queries www.msftncsi.com and needs to see 131.107.255.255 as
the answer, and then does an HTTP GET.  If anything is abnormal, it
assumes there is a proxy on the path.  Apple does something similar by
attempting to retrieve https://www.apple.com/library/test/success.html.
Unfortunately, this seems the best technique available to detect such
DNS interception and HTTP interception proxies that force a login or
force a click-through.

For MIF -- not just HE-MIF, but all of MIF -- we should not declare an
interface "up" until such a validation succeeds.  It is unfortunate
this is not solved at layer 2, where it arguably belongs.

Would it be worthwhile for MIF to start making a list of things that really need solutions elsewhere? Even if there are hacks or heuristics that are used in the absence of such solutions?

Keith


_______________________________________________
mif mailing list
mif@ietf.org
https://www.ietf.org/mailman/listinfo/mif

Reply via email to