Hotels/Airports with IPv6
Shane Ronan
shane at ronan-online.com
Fri Jul 10 22:25:21 UTC 2015
1.1.1.1 is usually a good bet
On Jul 10, 2015 6:21 PM, "Mark Andrews" <marka at isc.org> wrote:
>
> In message <20150710215658.GC23237 at puck.nether.net>, Jared Mauch writes:
> > On Sat, Jul 11, 2015 at 07:41:53AM +1000, Mark Andrews wrote:
> > > +1 and you will most probably see about 50% of the traffic being IPv6
> if
> > > you do so. There is lots of IPv6 capable equipment out there just
> waiting
> > > to see a RA.
> >
> > What I noticed when I ran a transparent HTTP proxy at my gateway
> > where it had IPv6 on the outside but the hosts inside did not, a lot
> > of traffic was converted from IPv4 to IPv6 on the exterior.
> >
> > As the internet has been moving to HTTPS/HSTS having
> > DHCP and client-side support of something like
> > draft-wkumari-dhc-capport is going to become more critical as the days
> > go by.
> >
> > While attempting to trigger the captive portal at RDU this
> > week, Boingo redirected a query for google to their HTTPS to the
> > portal and since HSTS was enabled I had no way to proceed from there
> > to the right location to authenticate.
> >
> > There was also some other broken stuff at RDU so I ended up
> > just using cellular data.
> >
> > - Jared
> >
> > --
> > Jared Mauch | pgp key available via finger from jared at puck.nether.net
> > clue++; | http://puck.nether.net/~jared/ My statements are only
> mine.
>
> I just type a random IP address into the browser when this sort of
> thing happens. Most of my connections are encrypted. Once the
> landing page comes up and I've clicked through a pointless terms
> of service they start working. If they intercept the session with
> their own cert I get lots of error dialogs. I then cancel the
> connection attempts and go the browser.
>
> Mark
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: marka at isc.org
>
More information about the NANOG
mailing list