Hotels/Airports with IPv6
Mark Andrews
marka at isc.org
Fri Jul 10 22:13:25 UTC 2015
In message <20150710215658.GC23237 at puck.nether.net>, Jared Mauch writes:
> On Sat, Jul 11, 2015 at 07:41:53AM +1000, Mark Andrews wrote:
> > +1 and you will most probably see about 50% of the traffic being IPv6 if
> > you do so. There is lots of IPv6 capable equipment out there just waiting
> > to see a RA.
>
> What I noticed when I ran a transparent HTTP proxy at my gateway
> where it had IPv6 on the outside but the hosts inside did not, a lot
> of traffic was converted from IPv4 to IPv6 on the exterior.
>
> As the internet has been moving to HTTPS/HSTS having
> DHCP and client-side support of something like
> draft-wkumari-dhc-capport is going to become more critical as the days
> go by.
>
> While attempting to trigger the captive portal at RDU this
> week, Boingo redirected a query for google to their HTTPS to the
> portal and since HSTS was enabled I had no way to proceed from there
> to the right location to authenticate.
>
> There was also some other broken stuff at RDU so I ended up
> just using cellular data.
>
> - Jared
>
> --
> Jared Mauch | pgp key available via finger from jared at puck.nether.net
> clue++; | http://puck.nether.net/~jared/ My statements are only mine.
I just type a random IP address into the browser when this sort of
thing happens. Most of my connections are encrypted. Once the
landing page comes up and I've clicked through a pointless terms
of service they start working. If they intercept the session with
their own cert I get lots of error dialogs. I then cancel the
connection attempts and go the browser.
Mark
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
More information about the NANOG
mailing list