Sujet : Re: public APs
De : blockedofcourse (at) *nospam* foo.invalid (Don Y)
Groupes : sci.electronics.designDate : 05. May 2025, 03:14:41
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <vv96uk$3eja4$1@dont-email.me>
References : 1 2
User-Agent : Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2
On 5/4/2025 2:40 PM, Edward Rawde wrote:
"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vv624s$e8eb$1@dont-email.me...
I seldom use public wifi. But, had the occasion to TRY to do so
at a local library branch.
>
Dismayed to find no HTTPS support; they apparently have an
"agent" interposed between all network accesses.
It may be that the agent doesn't interfere with accesses for all traffic, just https.
Likely HTTP and HTTPS. This is how most folks will likely use the AP.
Injecting itself in HTTPS seems stupid -- the sort of thing a designer
would realize as foolish (just *BLOCK* HTTPS rather than trying to act
as an active proxy)
The actual connection to The Internet is conditioned on acceptance of
an EULA. So, they expect any clients to have HTTP support in order
to serve that agreement to them.
I'd try a remote desktop connection to my computer at home and use that if it works (I've yet to find a location where it didn't).
I was limited to whatever apps were on the phone. As I rarely *use*
a cell phone (for anything other than AS a phone), there is nothing there
besides the HTTP client.
I can, perhaps, install/configure an email client or TELNET/SSH client
and see how those fare. But, I doubt most users are relying on WiFio
for those services.
I might need to whitelist the library's public IP range in my own
firewall, which I'd do if I used that library often.
My server "blocks all" and relies on a particular "knock sequence"
to allow ANY client access (the sequence being the access key so
it isn't tied to a range of IPs)
I don't let *anything* talk to me workstations.
Is this common? I.e., how do people do banking or other
"secure" transactions? Or, do they just use them to
"check pricing" at other stores?
Any library I've been to recently has a captive portal followed by an Internet service no different from what I get at home.
I have only this limited experience with THIS branch library
(though I would suspect the other branches in the system
behave similarly; the protection mechanisms applied at
a higher organizational level).
I may try an HTTPS connection to someplace like Digikey; there
should be no reason to "blacklist" that site! Or, pick a
bank at random and see if the HTTPS connection is deflected.
Or, one of the local hospital "patient portals" (HIPAA requiring
that sort of protection)