Le Jeu 9 juillet 2015 17:46, Yoav Nir a écrit :
This may be covered by the third bullet (sort of...) but I would like the
endpoint to be able to authenticate the captive portal (captor? MitM?).
not only authenticate, but protect the client-portal link. Since some
portals require sensitive
+1
Besides hotels, there's a number of cheap pre-paid mobile plans with similar
confinement. In those networks, you get the same cert warnings from your apps,
MUA, and so on.
On Jul 9, 2015, at 10:16 AM, Warren Kumari war...@kumari.net wrote:
Here is what I currently have.
On Jul 9, 2015, at 5:16 PM, Warren Kumari war...@kumari.net wrote:
snip /
The CAPPORT Working Group will define mechanisms and protocols to:
- allow endpoints to discover that they are in such a limited environment
- allow endpoints to learn about the parameters of their confinement
-
On 9 July 2015 at 07:16, Warren Kumari war...@kumari.net wrote:
Here is what I currently have.
LGTM.
On 9 July 2015 at 08:46, Yoav Nir ynir.i...@gmail.com wrote:
I would like the endpoint to be able to authenticate the captive portal
(captor? MitM?).
This is a fine secondary requirement; I
Le Mer 1 juillet 2015 00:55, Dan Wing a écrit :
Joining a network (the captive portal problem) is different from injecting
content hours or days after an endpoint has joined a network.
Not really unless you limit yourself to system with auth that never
expires (which, from a security POW, is
On Wed, Jul 1, 2015 at 1:01 PM, Martin Thomson martin.thom...@gmail.com wrote:
On 1 July 2015 at 06:13, Tero Kivinen kivi...@iki.fi wrote:
Which means
every time I go to the Helsinki Airport, I need to start browser, and
try to access something so I can click I agree so I can get my
emails
On 1 July 2015 at 06:13, Tero Kivinen kivi...@iki.fi wrote:
Which means
every time I go to the Helsinki Airport, I need to start browser, and
try to access something so I can click I agree so I can get my
emails downloading in the background.
That may be a legal constraint. The network they
On Jul 1, 2015, at 1:55 AM, Dan Wing dw...@cisco.com wrote:
On 30-Jun-2015 02:50 pm, Dave Dolson ddol...@sandvine.com wrote:
Hyperbole aside, the techniques in use today can be deployed in any network
gear along the path, even theoretically in a core router, and also to
present any
On Tue, Jun 30, 2015 at 2:10 AM, Martin Thomson martin.thom...@gmail.com
wrote:
I expect that
networks will continue to MitM, but we'll never be rid of the beast
until we have a viable alternative).
yes. this. I don't think there is much evidence to suggest incrementalism
to current MITM is
so.
-Dave
-Original Message-
From: Captive-portals [mailto:captive-portals-boun...@ietf.org] On Behalf Of
Warren Kumari
Sent: Tuesday, June 23, 2015 2:26 PM
To: captive-portals@ietf.org
Subject: [Captive-portals] Feedback requested: Charter text.
Hi all,
We have a BoF
10 matches
Mail list logo