News: This forum is now permanently frozen.
Pages: [1]
Topic: HTTPS websites are not redirected to the Captive Portal  (Read 6767 times)
« on: June 18, 2013, 12:04:28 »
FTBZ *
Posts: 11

I noticed that all HTTPS websites are not redirected to Captive Portal login page. HTTP is always working, but HTTPS get a browser timeout error. (tested on multiple OS with multiple browsers)

This is a known problem ? This is solved by activating the SSL on m0n0wall ?
« Reply #1 on: June 18, 2013, 23:31:30 »
Lee Sharp *****
Posts: 517

This is a known limitation.  The reason is that you can not just jump into an https session... (Certificates complain and all that)  So you have to do an http session before anything else will work.
« Reply #2 on: June 19, 2013, 05:34:43 »
FTBZ *
Posts: 11

Thank you for your help ! But this is annoying, because we've a majority of Mac client that used Safari. And this browser uses https as default Google search engine.
« Last Edit: June 19, 2013, 05:39:34 by FTBZ »
« Reply #3 on: June 19, 2013, 18:01:38 »
Lee Sharp *****
Posts: 517

Yes, it is a real pain, but it is a limitation of the https protocol, not captive portal.  Any redirect would have an invalid certificate, and send up a big warning in the browser.  You think you get support calls now...  Shocked
« Reply #4 on: June 19, 2013, 18:38:13 »
FTBZ *
Posts: 11

Sure, but I prefer that works with a warning rather that doesn't work. Now we're using a portal that shows use the certificate warning.

There is a ways to reverse this ?
« Reply #5 on: June 19, 2013, 21:21:08 »
Lee Sharp *****
Posts: 517

This is how https is intended to work.  The entire point of the ssl certificates is to prevent a man in the middle attack, which is essentially what captive portal is doing.

The workaround is to use a GPO to push out the certificate of your proxy to all of the clients.
« Reply #6 on: June 19, 2013, 22:21:21 »
FTBZ *
Posts: 11

This is how https is intended to work.  The entire point of the ssl certificates is to prevent a man in the middle attack, which is essentially what captive portal is doing.

I'm not sure to understand how it's dangerous for MITM attacks to allow https?

The workaround is to use a GPO to push out the certificate of your proxy to all of the clients.

I can't this is a guest SSID only and I don't manage computers in this side of my network.
« Reply #7 on: June 20, 2013, 22:32:55 »
brushedmoss ****
Posts: 446

If you want to intercept SSL in any captive firewall you will have a certificate issue.  the only way around this is to install a special cert that trusts the captive firewall into all users machines.

but, think about your local coffee shop or airport , they don't do this, what happens there, do you have to go to a non ssl site first ? .

OS X has features where it will attempt to discover a captive portal (don't have one to test) , I Assume this should work ?
« Reply #8 on: June 21, 2013, 05:41:38 »
Lee Sharp *****
Posts: 517

This is how https is intended to work.  The entire point of the ssl certificates is to prevent a man in the middle attack, which is essentially what captive portal is doing.
I'm not sure to understand how it's dangerous for MITM attacks to allow https?

You go to https://www.google.com and I redirect you to my page.  Now my certificate does not say www.google.com, which is what your browser is expecting, so it coughs up an error.  The is the behavior ssl is supposed to have, as it prevents website spoofing unless you have a certificate signed by a widely accepted root authority.
« Reply #9 on: June 21, 2013, 06:33:50 »
FTBZ *
Posts: 11

Thanks you for your help.

OS X has features where it will attempt to discover a captive portal (don't have one to test) , I Assume this should work ?

That's true, now I understand the concept of this feature. As I know Windows 8 purposes this function to and will probably be a standard in the next years.

The is the behavior ssl is supposed to have, as it prevents website spoofing unless you have a certificate signed by a widely accepted root authority.

That's true, now I understand. Thanks again.
 
Pages: [1]
 
 
Powered by SMF 1.1.20 | SMF © 2013, Simple Machines