On Thu, 2011-09-22 at 22:29 +0200, Tomasz Torcz wrote: > On Thu, Sep 22, 2011 at 11:27:41AM -0500, Dan Williams wrote: > > > right. the big problem is not working around a broken network or a network > > > with an attacker. The problem is false positives due to the pletora of > > > hotspot mangling techniques out there. Ideally, NetworkManager would deal with > > > the whole "hotspot detection" and lift any blocking done by the hotspot pre-login, > > > and then dnssec-triggerd in some way or shape can deal with the DNS investigation > > > and caching resolver reconfiguration. > > > > > > For example, the Apple iOS hotspot detection consists of simple trying to fetch: > > > http://www.apple.com/library/test/success.html > > > > There's long notes on how to do this in the TODO file in NM git, just > > needs the time to implement. It's essentially what Windows does as > > well, they just fetch a known URL and compare the result to a known > > response, and if there isn't a match, you're not connected to the > > internet. Various other plugins could check the response for known > > portal junk (and we can use the various portal auto-login standards like > > WPAD) to handle portal auto-login if we can. > > ConnMan (https://lwn.net/Articles/456967/) already has code to detect and login > on hotspot pages. Maybe you can just lift code from ConnMan instead of redoing it. Yeah, it does, but the licenses are incompatible (GPLv2 vs. GPLv2+). Dan -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel